Emergency response and disaster management plans shouldn't be filed away until the day they are needed, but tested regularly to identify weaknesses and improve plans. Learn the eight major areas that must be tested and how to stage an exercise.
By Ken Biery, Jr., CPP, CISSP, and Mike Hager, CISSP
Businesses need defense-in-depth strategies for protecting their sensitive data. They should start at the network perimeter and go from there to the operating system and applications and finally to the data itself.
The percentage of U.S. crude oil imports that came from Africa in 2006, up from 15 percent in 2004. Africa is currently the largest supplier of U.S. crude oil, making strategic alliances in that region critical.
Among the many books that purport to point the way forward for America in the wake of 9-11, this one stands out, chiefly for its clarity and sensibility. It is often difficult to deny the common sense of Brian Michael Jenkins' commentary.