In today’s world of interlocked companies and IT service providers, it’s standard practice for a company to ask its tech suppliers to fill out detailed questionnaires about their security practices.
There are almost as many different cybersecurity assessments as there are myths about them. It’s important to know what’s true. Let’s face it: Security assessments aren’t much fun for the team on the ...
Single, point-in-time cybersecurity assessments have become outdated in today's digital landscape, especially when it comes to managing third-party cyber risk. The dynamic nature of cyber threats ...
‘We don’t need administrative credentials. ... And we provide you with a report that you can sit down with [prospective customers to discuss their needs],’ says Bruce McCully, chief security officer ...
We not only have a personal responsibility to keep the University secure, but many federal laws have requirements in sponsored research agreements regarding the protection of data such as: Tampering ...
Conducting a security assessment, particularly with the assistance of a professional, can give K–12 IT teams an improvement plan to bring to school leadership. Bryan Krause is a K–12 Education ...
In 2017, the Security Leadership Research Institute (the Security Executive Council’s research arm) asked security practitioners to choose from a list of which risk-related activities their security ...
Get the latest federal technology news delivered to your inbox. The Veterans Affairs Department continues to have significant security weaknesses, including previously flagged flaws that have yet to ...
Data security is under increasingly strict supervision in China. Charles Feng, Yifan Lu and Lian Xue of Tahota provide a guide and explain when a security assessment is necessary for a cross-border ...
SCRANTON – A New Cumberland firm will assess and review Lackawanna County’s information and cybersecurity program ahead of a nearly $5 million project to upgrade aging switches, servers and other ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results