While preparing a risk-based audit plan, organizations include business continuity management as one of the important areas that serve not only as backup for pandemics…
To accommodate remote work requirements organizations continued to make changes to technology infrastructure. For the information technology team, remote work is common but there are…
To accommodate remote work requirements, organizations continue to make changes to technology infrastructure. For the information technology team, remote work is common but there are…
Indeed Inc. has instructed all its employees – including more than 1,600 in Austin – to work from home. Indeed, said it had also decided…
The last posting – Securing Cloud Data Part I – we discussed the security triad in the context of data security which includes data-at-rest encryption…
The news of cameras getting hijacked is not new and these examples exemplify the IoT security crisis. After reading through different publications it seems the…
According to the Opus and Ponemon 2018 report, 59 percent of companies said they have experienced a data breach caused by one of their vendors…
According to the Opus and Ponemon 2018 report, 59 percent of companies said they have experienced a data breach caused by one of their vendors…
According to the Opus and Ponemon 2018 report, 59 percent of companies said they have experienced a data breach caused by one of their vendors…
According to the Opus and Ponemon 2018 report, 59 percent of companies said they have experienced a data breach caused by one of their vendors…