Tags » IT Security

All about Jensa!

Jensa Consulting tutorial

What we can do for you!

– Mobile implementing

Your business is mobile and who needs an office, when we can help you out, sending invoices, cost proposals, book keeping, check orderstock and more, with your mobile Phone. 151 more words

Jensa Dot Com

The first one is the hardest?

Well! 3 days in and we finally got our first donation. Thank you! Thank you! I know this whole crowdfunding thing is a bit scary but if you cant trust a charity and an IT Security Consultant with 20 years experience who can you trust? 351 more words

Crowd Funding

Token-in-token, Agent-Principal model of authorization delegation

PAML token create portable authorization when the Enforcement point need not know either the Principal making the request or the Owner authorized to grant the request. 995 more words

Distributed Security

Pro-nun-ciation

OK.
We already had the CGEIT title certification. Which is pronounced in Dutch as ‘See goat’.
Now let’s add CSX. Pronounced by all as ‘See sex’. 37 more words

Information Risk Management

Security for Small to Medium-Sized Businesses is Dependent on Their Employees

By Adam R Cravedi

Compass IT security auditors are often asked if there is a single “most important” factor involved in safeguarding a business’s data assets. 553 more words

Cyber Attacks

Dear Dyson you're never going to believe this but...

I’m a huge Dyson fan!

No, not the old fashioned kind that chops at the air like an epileptic samurai. The kind like your your amazing: 588 more words

Crowd Funding

Unique IT Security Concerns in a Cloud Environment

Information technology security is of paramount importance for all computers, server farms, data centers, and their applications.  Security involves both physical security of the facilities and IT assets, security monitoring and management of the network infrastructure, servers, and applications.  2,066 more words

Cloud Computing