Red Tape

Wed
29
Jan

Risk Management: What is it, Why is it Important, and How to do it?

Contributed by Richard Parker

Tue
22
Oct

Developing a Security Awareness Program

Contributed by Mark Heckle
In today’s environment, technology has become a way of doing business. Because of technology, information security has become a necessary factor in how we use technology in our companies. There are certainly ways to help protect the technology with additional hardware and software, but the human component plays a vital role in reducing security risks. It is necessary to make the employees more security aware by developing security awareness programs. This research will show how to develop a security awareness program for your organization. It will also present ways to engage employees in such a plan for your organization. The security awareness program is the first step in protecting your organization from such events as ransomware, phishing attacks, spam, and many more.
 
 
This document is in PDF format. To view it click here.

Wed
31
Jul

The Effectiveness of Governance and Regulatory Bodies in Protecting Information Security

Contributed by James Robinson
Appropriate and proper understanding and of IT security should be considered an essential and pertinent requirement within any modern business amongst its executives and employees. But, as we have seen throughout recent news, this has not been the case for many companies. This text explores the effectives of governance and regulations as it relates to protecting our information security. This text focuses on the different organizations’ businesses have implemented with hopes of increasing security standards. The articles, figures and tables used in this paper will further elaborate the importance of these organizations and practices within companies.
 
This document is in PDF format. To view it click here.

Tue
23
Jul

Information Security Management – Current Threats, Challenges, & Mitigations

Contributed by Mark E. Turner
Security threats continue to present challenges to both private and public sectors. Evidence of this problem is provided in daily news reports of data breaches involving private citizens data. Information security Management (ISM) has become the largest growing field within Information Technology (IT) as a result. With funding being increased for the sole purpose of addressing these threats and the challenges associated with mitigating them, it is important to maintain an up to date and relevant understanding of current trends within this field.

Wed
20
Feb

Role of Machine Learning in change of Identity and Access Management: A proposed design of IAM for University System

Contributed by Subhrodip Roy Chowdhury

Pages

Subscribe to RSS - Red Tape