Target’s well-publicized disclosure that customers’ personally identifiable information (PII) had been compromised is the latest software “glitch” that is getting a fair amount of attention. Read on if you would like to know how to secure your systems without having to rely upon security scans that only detect the presence of a problem after it is already on your server.
Corporations, government agencies, and other institutions need to embrace industry best practices that have been proven to help develop and implement reliable systems. One of the most important considerations is the need for a secure, trusted application base. This article will help you get started delivering systems that can be verified and supported while continuously being updated as needed.
Leslie Sachs writes on how employees in many companies have essentially learned to no longer raise their concerns because there is no one willing to listen, and—even worse—they may have suffered consequences in the past for being the bearer of bad tidings. Leslie refers to this phenomenon as learned complacency.