Tom Scholtz

Articles by Tom Scholtz

Information security policy: Best practices

Policy forms the foundation of an information security solution, but many organizations struggle to turn documented policy into reality. Effective policy compliance requires a broad set of interrelated practices and processes, reports the META Group.

Enterprise security: Process makes perfect

Effective information security requires consistent policies, effective human resources, and appropriate technology. However, a process-centric approach is essential for providing the requisite scalability, consistency, and auditable characteristics of enterprise wide security and privacy solutions, says new research from the META Group.

Meta Trend Update: Information security programs and organization

Organizations are shifting their strategic focus from establishing consolidated information security teams toward initiating enterprise security programs. However, the success of these programs is inextricably linked to the successful establishment of clear organizational roles and responsibilities, according to META Group.

Addressing European privacy requirements

The European Union's Directive on Data Protection legislation is being implemented by member states. Affected organizations must take the requisite action to ensure their business practices and security enforcement mechanisms are brought into compliance.

Tech News