Search for: "Mandia v. Mandia" Results 1 - 8 of 8
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
25 Aug 2021, 5:01 am by Robert Chesney
The following piece is adapted from my newly-released eCasebook “Cybersecurity Law, Policy, and Institutions” (v.3.1), which is available free and in full (270+ pages) in pdf format here. [read post]
9 Dec 2014, 10:38 am by Kevin LaCroix
Instead, the best approach is a holistic approach:  basic blocking and tackling such as password protection, encryption, employee training, and strong, multi-faceted intrusion detection systems[v] really trump reliance on a “50 foot high firewall” alone. [read post]
10 Mar 2015, 4:28 am by Kevin LaCroix
[v] Responsiveness: Building relationships with forensic investigators before a cyber-attack occurs will help achieve two main goals. [read post]
9 Jan 2015, 4:31 am by Kevin LaCroix
[v] A thorough reading of the history behind the Framework will point to two conclusions: (1) it was not meant to become the national standard for cyber security best practices here in the United States (the Framework expressly says adoption of its principles is “voluntary,” though many will argue that it is already de facto a national standard being used by the government and its third-party vendors), and (2) the Framework was designed so that executives and employees of any… [read post]