- 
           					Create a written IT security policy that identifies critical assets and defines policies for physical security, account management, and backup and recovery among other areas. 
            					  		    					
           					 FORBES: Do You Really Need Cyber Liability Insurance? 
- 
           					We track important developments in homeland security policies and programs in the United States National Guard, the Federal Emergency Management Agency, the United States Coast Guard, U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement, United States Citizenship and Immigration Services, the United States Secret Service, the Transportation Security Administration, and Civil Air Patrol. 
            					  		    					
           					 CENTERFORSECURITYPOLICY: Homeland Security 
- 
           					Rather, it comes from choosing the right management solution and setting up and enforcing good mobile security policies. 
            					  		    					
           					 FORBES: Can Nokia's Lumia Steal RIM's Security Thunder? 
- 
           					Rather than abandoning BYOD, companies will learn to use the right Mobile Device Management (MDM) software to create the right security policies and keep costs under control. 
            					  		    					
           					 FORBES: Will The New Wave Of Prosumer Tablets Beat The iPad In The Enterprise? 
- 
           					Directories are a key piece of infrastructure for supporting user management, establishing rules and policies for net resource use, and managing security certificates. 
            					  		    					
           					 CNN: Sun/Netscape Alliance brings directory ties