Archive for April, 2010

The Data Lifecycle goes through 5 steps: creation, usage, transport, storage and destruction.

Image via Wikipedia There is a lot of focus on network security and application security today. Years ago it was operating system security that was all the rage. But with the advent of the strict requirements of some of the regulations such as HIPAA, PCI, SOX, and FISMA, more attention needs to be paid to [...]