Saturday, June 23, 2007

New Group of ATE Questions Posted

I just noticed that SearchSecurity posted my next group of five Ask The Expert questions on identity and access management:

What challenges arise when designing a logging mechanism for peer-to-peer networks?
This question posed on 30 May 2007

What are the potential risks of giving remote access to a third-party service provider?
This question posed on 20 May 2007

Should void user IDs be preserved in an audit history?
This question posed on 15 May 2007

What are the best security practices for securing sensitive data on PDAs?
This question posed on 11 May 2007

Is there any policy or regulation to help protect biometric data?
This question posed on 02 May 2007

0 Comments:

Post a Comment

<< Home