Snowden: Internetnutzung immer noch transparent
In einer Live-Schaltung auf die CeBIT erklärte Edward Snowden, dass sich nach seinen Enthüllungen zwar Einiges zum Besseren gewendet habe, aber noch viel zu tun wäre. So sei das Verhalten von Internetnutzern immer noch extrem transparent, erläuterte er. Angreifer hätten es wegen der gestiegenen Ausbreitung von Verschlüsselung, vor allem von HTTPS, nun deutlich schwerer, an Klartext zu kommen. Es stimme aber noch immer, dass wir derzeit ein Goldenes Zeitalter für Geheimdienste erleben.
Allowing employees to work away from the office, i.e., outside of the physical premises of the organization (otherwise known as “teleworking”) is becoming a common practice in the way to do business today. The ability to work remotely is seen as both a source of incentive for an employee’s productivity ...
Traditionally, information security has been perceived as an activity that was built around protecting sensitive information assets – after all, this is what the first (2005) revision of ISO 27001, and its predecessor BS 7799-2, also emphasized. These standards required companies to identify all the assets, and then build the ...
For outsiders, it’s not easy to distinguish among the specific purposes of Business Continuity Management (BCM), Information Security (IS), and IT Disaster Recovery (IT DR). All three areas have something to do with “security,” “losses,” “disasters,” and “protection.” Read on to learn more about the particular roles of disciplines often ...