Under federal, state, regulatory, and contractual requirements, Michigan Tech is responsible for developing and implementing a comprehensive information security program. The purpose of this document ...
The federal government is requiring federal contractors to implement specific guidance in the form of NIST 800-171 in an effort to curb the trend of federal government data being exposed on contractor ...
Tax and accounting professionals have a new resource for implementing or improving their written information security plan, which is required under federal law. The IRS in a news release Tuesday ...
RFG believes calculating security staffing requirements is a methodical process that requires significant planning and documentation. IT executives should identify the ownership of security ...
"We see the CSO becoming more and more involved and having a bigger say in the infrastructure decisions and the business-level decisions." - Kathryn Hughes John Linkous, eIQnetworks Jon Geater, Thales ...
All members of the university community share in the responsibility for protecting information resources to which they have access. The purpose of this document is to establish minimum standards and ...
There are several considerations for companies creating an information security policy. So, how can organisations ensure they have a strong policy in place which reflects the needs of the business?
No matter how big your company is or what it does, security is a primary consideration when choosing a Web service for all applications. This first in a series of three articles describes the 10 most ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results