1
  • Implementing a Security Policy Within an Organization

    Hello everyone,My name is Trevor, and I'm a student at UAT, doing some research on different implementation frameworks for establishing a security policy. In particular, I came across the SKiP (Security Knowledge in Practice) framework, and saw some advantages and disadvantages.This framework has 6...

    tlawren35 pointsBadges:
  • Master thesis in BYOD

    I decided to choose BYOD (bring your own device) for my master thesis but I couldn't find any research work (Research Papers) done in this area. Only a lot of articles on the Internet. Please guide me how can I go further? What things should I include in my thesis or for literature survey? OR...

    denialwayne10 pointsBadges:
  • Master thesis topic in (information) security

    Please suggest me some topic/title for my master thesis. I'm going to do my master degree in IT. I'm very confused, which problem should I choose for thesis. I was thinking for smartphone security or something similar. If you can suggest me any useful topic (smartphone or may be other). Thanks in...

    denialwayne10 pointsBadges:
  • Security Policy Confidentiality

    Some of my customers are asking for copies of some of our security policies. I mentioned that the documents were confidential but they insist on providing evidence that the policies exist. Should I give them a copy? These customers all have NDAs with my company.

    Vper10 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following