With technology advancing rapidly and new threats taking shape, zero trust, a security strategy based on continuous authentication, has become a major priority for the Department of Defense. In ...
Many years ago, I attended a great training course. The course was called “Consulting for Organizational Effectiveness,” and I’ll never forget a question asked by the instructor. He asked us to ...
The Information Security Forum (ISF) has issued its GDPR Implementation Guide, with best practices for guiding a compliance program ahead of the European Union’s General Data Protection Regulation ...
Organisations have often tried to begin reporting on complex sustainability areas without addressing their business's operational aspects, leading to poor reporting and implementation. For many ...
The National Science Foundation and the White House Office of Science and Technology Policy have asked the public to comment on a plan to implement a research infrastructure that would provide ...
Defining an overall approach to security helps you avoid the pitfalls of simply throwing a bunch of point solutions at various problems. This Excel-based tool will help you develop an enterprise ...
The finance ministers of the G20 nations have called for the swift and coordinated implementation of the G20 roadmap on crypto assets. The roadmap, which was adopted by the G20 Finance Ministers, aims ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results