Warning: This article does not contain talk of convergence, silos, fusion, tipping points, disruptive technologies, a place at the table and all the other new-age, highfalutin mumbo-jumbo that too often says more about the speaker than the concerns of the listener.
In December 2010, the Puerto Rico Ports Authority (PRPA) issued a proposed regulation that would require all inbound cargo containers, regardless of whether the container was shipped from a company located in the United States or from a company located in a foreign country, to be scanned for contraband. If enacted, the proposed scanning regulation would increase costs and result in supply chain delays. The cost would range from $58 to $70 per container (depending on the size of the container).
Crime pattern analysis (CPA) is a generic term that covers a wide range of approaches and techniques in the field of crime analysis. CPA looks for crime patterns and trends. Some of these methods and theories used in crime pattern analysis include criminology theories such as Routine Activity Theory, Rational Choice Theory, Repeat Victimization and Crime Pattern Analysis.
As the number of solutions available in the cloud grows and an increasing number of organizations turn to SaaS-based solutions to improve operations while reducing their costs, an increasing amount of sensitive information is being communicated via the Internet. IT professionals are rightly concerned with uptime, privacy risks and overall security.
Every two seconds someone becomes a victim of identity theft in America and last year, identity theft totals amounted to $100 billion. Even though many organizations are expanding security efforts, the number of identity theft incidents is still increasing as thieves continue to change their tact on a daily basis.
You can substitute any threat or compliance challenge, for any industry, and come to the same conclusion. With the advent of IP-based security and the widespread use of non-proprietary servers and storage, solving problems through security is no longer simply the domain of the Security group. Because IT has subject matter expertise, and often holds the budget reins, IT now has a head seat at the table.
From newspapers and television broadcasts to cell phones, computers and radios, our daily routine is surrounded and bombarded with all forms of communications, and we may feel informed.
There are three significant issues facing the online security industry in 2011. None of them are particularly new, but they are approaching crisis point.
It is rare and wonderful when a new infrastructure platform unites with applications to create a truly dynamic technology solution that provides significant leverage to both the cost/benefit equation of
Some policies, procedures and measures can be counterproductive when it comes to protecting emails, voicemails and communicating of large data files, contends Steven Brower of the law firm Buchalter Nemer.