With the RSA Cybersecurity Conference right around the corner from our office in San Francisco, it seems only fitting that the March article focuses on cybersecurity. Long gone are the halcyon days of ...
This five-part series provides an introductory roadmap to the California Consumer Privacy Act’s (CCPA) new cybersecurity audit requirement and the California ...
Ensuring the security of customers’ confidential data has never been more important for organizations and IT leaders. The Covid-19 pandemic introduced a new era of digital collaboration technology and ...
The HHS’ Office for Civil Rights’ audit program was too narrow in scope to effectively assess data protections and reduce cyber risks in the healthcare sector, according to the report. The report, ...
The CCPA requires covered businesses to implement reasonable security procedures and practices appropriate to the nature of the personal information they control to protect it from unauthorized or ...
This Written Information Security Program describes the safeguards implemented by DePauw University to protect confidential data. The goal of the program is to ensure the security of these assets to ...
A lot of the work I do, especially for clients regulated by the Department of Labor (DOL), involves third-party risk reviews. In 2021, the DOL released a list of cybersecurity best practices. Now, in ...
The Ethereum Foundation is doubling down on one of the ecosystem’s most critical needs: security. On Tuesday, the organization unveiled a new initiative aimed at tackling a persistent challenge in ...
The management of information risk has become a significant topic for all organizations, small and large alike. But for the large, multi-divisional organization, it poses the additional challenge of ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results