Nerds On Site

Information Management Plan

Creating an Information Management Plan – Part 6 Controls – What Kind of Armor Do We Need?

News: W3C Standard for a Database Engine Within the Browser – Cool, but Will it Create More Security Holes? The Fix for the SSL Renogiation Flaw Has Been Finalized Ecryption Keys Will Contunie to Get Bigger (Note that This Refers to RSA Asymmetric Keys – 128-bit Symmetric Keys are Still Strong Google Chrome Takes the …

Creating an Information Management Plan – Part 6 Controls – What Kind of Armor Do We Need? Read More »

Creating an Information Management Plan Part 5 Where Doth Thy Data Wander?

In Part 4 of this series, we asked the question: “Where does the data live?” Sensitive data that is at rest must be protected by access controls and by encryption, according to its classification and security policies. Data does not stay in one place, though – it does not even stay in the many places …

Creating an Information Management Plan Part 5 Where Doth Thy Data Wander? Read More »

Scroll to Top