Which organization(s) are responsible for the timely distribution of information security intelligence data?
What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Companies can now be sued for privacy violations just as easily as they can be sued for security compromises.