Security News

Introducing Permit.io: Simplifying access control and policy management for developers
2023-05-18 04:00

In this Help Net Security video interview, Or Weis, Co-Founder and CEO of Permit.io, discusses an innovative approach to managing permissions and access control within applications. We will explore policy as code and how it addresses organizations' challenges in managing access control effectively.

Information security incident reporting policy
2023-04-26 12:00

TechRepublic Premium Mobile device security policy PURPOSE This Mobile Device Security Policy from TechRepublic Premium provides guidelines for mobile device security needs in order to protect businesses and their employees. This policy can be customized as needed to fit the needs of your organization.

Mobile device security policy
2023-04-24 12:00

TechRepublic Premium Comparison guide: Top enterprise collaboration tools PURPOSE Some of the most important tools in business are used for collaboration. Without these types of solutions, your staff would struggle to remain as productive as needed.

Incident response policy
2023-04-23 12:00

TechRepublic Premium Comparison guide: Top enterprise collaboration tools PURPOSE Some of the most important tools in business are used for collaboration. Without these types of solutions, your staff would struggle to remain as productive as needed.

Security response policy
2023-03-19 12:00

TechRepublic Premium Electronic communication policy This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications .....

Employee termination policy
2023-03-13 12:00

TechRepublic Premium Business continuity policy PURPOSE The purpose of this policy is to provide guidelines for establishing and following appropriate business continuity requirements. This policy can be customized as needed to fit the needs of your organization.

Remote access policy
2023-03-08 11:00

TechRepublic Premium Risk management policy SUMMARY Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impacts.

Risk management policy
2023-03-08 11:00

TechRepublic Premium Offshore work policy It's common practice for companies to use offshore employees or contractors in order to offload work to specialized individuals or reduce costs associated with certain tasks and responsibilities. This can free up staff to focus on more complex and valuable initiatives, and also ensure 24×7 operations for companies which rely upon on-call staff and subject-matter .....

Transmission of sensitive data policy
2023-02-23 11:00

Data in transit means data is at risk if the proper precautions aren't followed. Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems.

Health insurer Aflac blames US partner for leak of Japanese cancer policy info
2023-01-11 03:29

Zurich’s Japanese outpost also leaks a couple of million records Global insurer Aflac's Japanese branch has revealed that personal data describing more than three million customers of its cancer...