Cloud Computing, AKA SaaS

Synopsis: The effective weak link of cloud computing: An oversight by a single vendor creates a single point of failure that can have devastating effects on an untold number of its customers. Commentary: Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and… Read More

Syndication Updates for 2009-03-09

12:09am mdpeters posted 9 items. (Hide Details) Sample Information Security Program Charter: Adaptive Best Practices Policy Samples: Documents Adaptive Best Practices Policy Samples: Sample Information Systems and Technology Security Policy: Sample Information Security Program Charter: Adaptive Best Practices Policy Samples: Sample Information Security Program Charter: Sample Information Systems and Technology Security Policy: 1:20pm mdpeters posted… Read More

Syndication Updates for 2009-02-22

9:56pm mdpeters posted 170 items. (Hide Details) Impossibility Motion for change of venue—Based on publicity FN10 Witnesses testifying as to documents Preemption Motion challenging method of choosing jury Use of computer security consultants, EDP auditors, and computer professionals FN9 Motion to reduce charge Subjects of discovery; checklist Arraignment; Pleas; Continuance of Case in general Other… Read More

Policies, standards, and Guidlines, Oh My!

  My pet project for the past three years has been the Holistic Operational Readiness Security Evaluation wiki, otherwise known as the HORSE Project. In addition to some great audit guidance, security advice, tools, ect, there is a full compliment of policies to use as boilerplates for any organization. Find it all here: http://lazarusalliance.com/horsewiki/ It… Read More