Security Central

In Security Central LSEC gathers relevant informtion related to security issues. The information is presented in different formats (Word, PDF, Excel,...) depending on availability. We also offer video material. In the private section, which is only available to our members, more documents are offered. If you are interested in becoming a member don't hesitate to contact us.

%AM, %29 %332 %2014 %06:%Jan

Security Challenges In Virtual Environments and how to address them

Details

  • Keywords Virtualization Cloud Computing Security
  • source LSEC Virtualization Cloud Security Revisited 2010
  • Author Check Point Software Technologies - Jeroen De Corel
  • Vertical Market Information Technology
  • Strategic Model Technology
  • Company Check Point Software Technologies - Jeroen De Corel
  • File Type PDF Document
%AM, %29 %331 %2014 %06:%Jan

Legal Challenges in Cloud Computing

Details

  • Keywords Virtualization Cloud Computing Security Legal
  • source LSEC Virtualization Cloud Security Revisited 2010
  • Author DLA Piper - Maarten Truyens
  • Vertical Market Information Technology
  • Strategic Model Technology
  • Company DLA Piper - Maarten Truyens
  • File Type PDF Document
%AM, %29 %330 %2014 %06:%Jan

Some solutions in managing Security on Virtual Machines

Details

  • Keywords Virtualization Cloud Computing Security
  • source LSEC Virtualization Cloud Security Revisited 2010
  • Author McAfee - Peter van Eeckhout
  • Vertical Market Information Technology
  • Strategic Model Technology
  • Company McAfee - Peter van Eeckhout
  • File Type PDF Document
%AM, %29 %330 %2014 %06:%Jan

Some solutions in managing Security on Virtual Machines

Details

  • Keywords Virtualization Cloud Computing Security
  • source LSEC Virtualization Cloud Security Revisited 2010
  • Author McAfee - Peter van Eeckhout
  • Vertical Market Information Technology
  • Strategic Model Technology
  • Company McAfee - Peter van Eeckhout
  • File Type PDF Document
%AM, %29 %329 %2014 %06:%Jan

Legal background for Data Protection, Data Breach Notification

Details

  • Keywords explorer exploit hacking
  • source Sophos
  • Author Sophos
  • Vertical Market Information Technology
  • Strategic Model Technology
  • Company CRID - Yves Poullet
  • File Type PDF Document
%AM, %29 %328 %2014 %06:%Jan

Data Protection and Breach Notification History and recent implications in UK and for DPA's

Details

  • Keywords Data Protection Privacy EC Breach Notification
  • source LSEC Data Protection & DLP 2010
  • Author Field, Fisher, Waterhouse (FFW) - Stewart Room
  • Vertical Market Information Technology
  • Strategic Model Consulting
  • Company Field, Fisher, Waterhouse (FFW) - Stewart Room
  • File Type PDF Document
%AM, %29 %327 %2014 %06:%Jan

Perspectives on Notification of Data Breaches from the European Commission

Details

  • Keywords Data Protection Privacy EC Breach Notification
  • source LSEC Data Protection & DLP 2010
  • Vertical Market Information Technology
  • Strategic Model Consulting
  • Company LSEC
  • File Type PDF Document
%AM, %29 %326 %2014 %06:%Jan

the need for a clear Data Breach Notification Law for Belgium

Details

  • Keywords Data Protection Privacy EC Breach Notification
  • source LSEC Data Protection & DLP 2010
  • Author Belgian DPA - Verhaeghe Dieter
  • Vertical Market Information Technology
  • Strategic Model Consulting
  • Company Belgian DPA - Verhaeghe Dieter
  • File Type PDF Document
%AM, %29 %326 %2014 %06:%Jan

Strategies for Mitigating Insider Risk

Details

  • Keywords Data Protection Privacy EC Breach Notification
  • source LSEC Data Protection & DLP 2010
  • Author RSA - Johan Vanhove
  • Vertical Market Information Technology
  • Strategic Model Consulting
  • Company RSA - Johan Vanhove
  • File Type PDF Document
%AM, %29 %325 %2014 %06:%Jan

Solutions for Data Protection and DLP

Details

  • Keywords Data Protection Privacy EC Breach Notification
  • source LSEC Data Protection & DLP 2010
  • Author McAfee - Spekkel Nick
  • Vertical Market Information Technology
  • Strategic Model Consulting
  • Company McAfee - Spekkel Nick
  • File Type PDF Document
Page 6 of 8

LSEC for Security Professionals

lsec-prof

LSEC for Security Companies

lsec-com

LSEC for enterprise & government

lsec-gov

LSEC for academia & research institutes

lsec-research

Request information about LSEC Membership

Click here

Sign up for our newsletter

Click here

Learn more about current projects & industry collaborations

Click here

Contact us

Click here

logo-acdcec

Privacy | Disclaimer | Responsible Disclosure Copyright LSEC - Leaders In Security 2002 - 2017 - Kasteelpark 10, 3001 Heverlee - Leuven | tel. +32.16.32.85.41