When it comes to a network security policy, there often seems to be a direct tradeoff between security and maintainability. I’ve found this doesn’t always have to be the case. Even in large organizations, security policies can be easy to maintain if you follow some best practices that ensure they remain clear, intuitive and well-organized .
- REUVEN HARRISON, CTO Tufin Technologies
- InfoSecurity
- Posted On

Mobile working is a hit with individuals and organisations, giving valuable extra flexibility and allowing workers in the field to make use of otherwise unproductive time, when using public transport for example. It is also opening up a new front in the battle over data security. While data loss due to theft of equipment, such as portable computers, is taken very seriously and can carry penalties including heavy fines or permanent bans from obtaining and holding customer details in the future, organisations need to do more to ensure Visual Security Compliance.
Justin Pirie, Director of Communities and Content for Mimecast, takes a look at the ongoing debate around cloud standards.
When evaluating our effectiveness in dealing with cyber defence, we have two layers of uncertainty and risk: how effectively are we protecting critical information, and what are the adversaries actually getting and how might they use it against us? 


