Home » Archives by category » Security guidelines (Page 2)
RBI defers operationalisation of CDS guidelines till Nov-end

The Reserve Bank of India (RBI) has deferred operationalisation of its credit default swap (CDS) guidelines by a month till November-end to give market participants like banks and other financial institutions more time to clarify details on documentation and operational aspects. “Market participants have asked for certain clarifications regarding documentation, operational aspects and the arrangement […]

Continue reading …
Transportation Security Administration Agrees to Re-Assess Policies for Job Applicants with HIV

The Transportation Security Administration (TSA) agreed this week to review its medical guidelines for applicants with compromised immune systems, including people with. The agreement is part of a settlement between the TSA, the American Civil Liberties Union and the ACLU of Florida. In August 2009, the ACLU filed an administrative complaint on behalf of an […]

Continue reading …
Majority of Older Americans Get Too Much Salt

A new report from the Centers for Disease Control and Prevention says most Americans still consume too much sodium, despite the fact that we should all know better. The dangers of a high-salt diet have been touted for decades (although not without controversy) – Aarp.org. Reducing sodium intake has been proven to cut high blood […]

Continue reading …
Obama builds on national security record

A single moment that may have defined President Obama as a surprisingly tough commander in chief came in December 2009, when he accepted the Nobel Peace Prize while leading two wars – USA Today. “I face the world as it is and cannot stand idle in the face of threats to the American people,” he […]

Continue reading …
StrikeForce Technologies’ CEO Invited to Present at Financial Services Industry Conference

SIFMA Presentation Highlights Relevance of Company’s Technologies as Financial Institutions Seek to Meet FFIEC Guidance Requirements

Continue reading …
PTA prepares ICT security guidelines for stakeholders

Chairman Pakistan Telecommunication Authority (PTA) Mohammed Yaseen has said that PTA has completed a thought-provoking exercise in collaboration with renowned industry players for drafting “Information and Communication Technology (ICT) Security Guidelines” for telecommunication, government of Pakistan and end-users – DailyTimes Karachi. The documents have been shared with respective stakeholders to assist them, while building Information […]

Continue reading …
Michael Emerson, Jonathan Nolan Spark Person of Interest

Television viewers were introduced last month to Mr. Finch, a billionaire software genius who developed a computer program that can predict the identities of those connected to future violent crimes. In Person of Interest, Finch and his field agent, ex-CIA officer John Reese, work only from a list of Social Security numbers to puzzle out the […]

Continue reading …
Witness claims threats, collapses at murder trial in Belleville

A key witness in the prosecution of Aaron “Chill” Jackson for the murder of Washington Park Mayor John Thornton collapsed on the stand late Wednesday, after reportedly passing a woman in the hallway who she believed was part of an effort to threaten her life. LaQueshia Jackson, who is not related to the defendant, had […]

Continue reading …
Amazon Silk Offers Increased Security on Open Wi-Fi Networks

PCWorld – 18/10/2011. The cloud-based design of Amazon’s Silk browser has positive security side effects because it encrypts all traffic between users and websites, especially important when connected over unprotected Wi-Fi networks where session hijacking attacks can occur easily, the company said. Amazon developed Silk to increase browsing performance on its new Android-based tablet, the […]

Continue reading …
Security expert rules out cyber warfare

Cyber war – long considered by many defence experts to be a significant threat – may never happen, a security expert says. Thomas Rid, expert in war studies, King’s College London, argues that cyber warfare has never taken place, nor is it currently doing so and is unlikely in the future. Rid, who specializes in cyber […]

Continue reading …
Page 2 of 3123