Share this page | Email | Contact Us

Special Report on

Security by Collaboration

security by collaboration special research report Photo by sri.michaelsampson.net
Research Triangle Institute International (RTI) is under contract from the U.S. Department of Health and Human Services (DHHS) to work with the Office of the National Coordinator (ONC) for Health Information Technology to implement a national collaborative effort to address privacy and security policy questions affecting interoperable health information exchange (HIE). The office of Governor Gregoire and the Washington State Health Care Authority (HCA) designated Qualis Health, a nonprofit quality improvement organization, to serve as Washington State’s lead non-governmental agency for this effort. The HISPC ...
In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication mechanisms, such as Public Key Infrastructures (PKIs) or Kerberos have allowed this model to be extended to distributed systems within a few closely collaborating domains or within a single administrative domain. During the last years, Computer Science has moved from centralised computer systems to distributed computing. This evolution has several implications on the security models, the policies and the mechanisms needed to protect users’ information and resources in an increasingly interconnected ...
REVIEWS AND OPINIONS
Britain to Probe Collaboration with CIA Renditions by William ...
Breaking from President Barack Obama’s insistence on "moving forward, not backward" in investigating U.S. detainee torture, the British government appears poised to investigate its own complicity with the U.S. Central Intelligence Agency (CIA) in "rendering" British citizens and residents and subjecting them to "enhanced interrogation" techniques. The British newspaper, The Guardian, is reporting that Prime Minister David Cameron and the new foreign secretary, William Hague, have agreed on the terms of a judge-led inquiry into claims that British security services were complicit in torture of terrorism suspects.  The ... market research, surveys and trends
The Hierarchy Name Game – Do the Rules Apply in Enterprise ...
I’ve always been one to respect the company hierarchy with any official communication tool that I use at work. It’s natural for me now to list the names of employees, or send @username messages in hierarchical order – senior executives are listed first, and others are listed after that in order of rank. However, with the influx of social tools and young employees into today’s enterprise, I question how the corporate hierarchy is or is not intertwined with the way that employees use real-time collaboration tools . Do employees treat these tools like email, or are there different social conventions for ... market research, surveys and trends

SURVEY RESULTS FOR
SECURITY BY COLLABORATION

Microsoft Research Reveals New Trends in Cybercrime: Greater ...
Microsoft Corp. today released research showing an acceleration in the number of security attacks designed to steal personal information or trick people into providing it through social engineering. Microsoft’s most recent Security Intelligence Report, a comprehensive analysis of the threat landscape, shows that attackers are increasingly targeting personal information to make a profit and are threatening to impact people’s privacy. The report found that during the first half of 2007, 31.6 million phishing scams were detected, an increase of more than 150 percent over the previous six months. The study also shows a 500 percent ... industry trends, business articles and survey research
First Global CCIE Survey Forecasts Growth in Virtualization ...
{"s" : "csco","k" : "a00,a50,b00,b60,c10,g00,h00,l10,p20,t10,v00","o" : "","j" : ""} Press Release Source: Cisco On Tuesday March 23, 2010, 8:00 am EDT SAN JOSE, CA--(Marketwire - 03/23/10) - To salute more than 15 years of its CCIE ® certification and to gain insight into what digital infrastructures will look like over the next five years, Cisco (NASDAQ: CSCO - News ) today announced the results of the most comprehensive end-customer survey ever conducted of the international CCIE community. Commissioned as part of Cisco's overall 25th anniversary industry trends, business articles and survey research
RELATED NEWS
Could Cisco's Cius end headaches for the IT team?
Network giant Cisco surprised the world the week before last by launching a tablet aimed squarely at enterprise collaboration. The tablet, called Cius, was announced at Cisco Live in Las Vegas. As the second-biggest vendor in enterprise networking technology, Cisco knows how to grow market share, and this client side tablet device could be a key strategy play from the giant. It is widely recognised that the proliferation of mobile technologies such as the iPad is making life difficult for the IT department. The tech guys are currently struggling to keep track of who is carrying what information around on their iPad or BlackBerry. market trends, news research and surveys resources
Serbia, Kosovo clash at UN over explosion
(Reuters) - Serbia and its former province of Kosovo clashed in the U.N. Security Council on Tuesday over who was to blame for an explosion that killed one person in an ethnically divided Kosovo town last week. The dispute also reopened old fault lines in the council between the West, which broadly supported a 2008 independence declaration by Kosovo's Albanian majority, and Belgrade's long-standing ally, Russia, which opposed it. Serbian President Boris Tadic, who called the Security Council meeting to discuss last Friday's blast in Mitrovica, which wounded 10 minority Serbs and killed a Bosnian Muslim ... market trends, news research and surveys resources

INFORMATION RESOURCES

Google Apps security white paper - Security Whitepaper: Google ...
Google Apps messaging and collaboration products as well as for our security and compliance products, powered by Postini. A SAS 70 audit is an independent ... technology research, surveys study and trend statistics
Health Information Security and Privacy Collaboration - Action and ...
and security challenges presented by electronic health information exchange. The third phase focused on multistate collaboration, which resulted in the ... technology research, surveys study and trend statistics
Security and Privacy: At Odds with Speed and Collaboration?
sometimes competing needs for increased security and enhanced collaboration and business speed. How are these competing forces resolved? ...
REAL TIME
SECURITY BY COLLABORATION
  1. profile image William_Allmond Good remarks by DHS Secretary at chem security summit today focusing on need for continued govt-private sector collaboration #cfats #socma
QUESTIONS AND ANSWERS
Do the collaboration advantages of using Google Docs outweigh the ...
Sara: absolutely agree with the comments re: user bearing onus for compliance issues (data protection, security etc) including the forensic issues. When you say your company is satsified that Google Docs protects your IP well enough, I presume you are referring to the incidental breaches that might occur in the event of a third party obtained unauthorised access and making unauthorised use of your IP. I skimmed through the IP provisions regarding ownership of content, but was wondering what people think about clause 11. Whilst Google acknowledges the users' ownership of copyright, they reserve to themselves a perpetual, ...
Why are document collaboration tools necesary? | LinkedIn Answers ...
Job Search (2), Occupational Training (2), Resume Writing (1), Staffing and Recruiting (1), Organizational Development (1), Planning (1), Communication and Public Speaking (1), Small Business (1) The most compelling reason is the elimination of multiple copies of a document with the same name, each of which may have been modified by someone. The task of reconciling those variations can be large. The second is to interrupt the common practice of attaching documents to email messages that can be forwarded to people who should not be seeing the attachment. The third is the ability to be confident that the organization's IP ...