Last fall, under pressure from the U.S. Justice Department, the association, known as NACAC, removed three provisions from its guidelines....
Posts
This is the warning. The surge in cheap IoT devices—bulbs, plugs, fridges, rubbish bins, toasters—to say nothing of phones, printers,...
Quoting from a Sept. 8, 2016 press release from the Consumer Financial Protection Bureau, “Spurred by sales targets and compensation...
Importantly, Amazon secures S3 buckets by default. In other words, for a bucket to be publicly accessible to any old...
Catalyst Capital Advisors told its investors that it had a dedicated risk manager. It told them that this dedicated risk...
The Higher Education Community Vendor Assessment Toolkit (HECVAT) attempts to generalize higher education information security and data protection questions and...
With IT resilience and disaster recovery specialists already facing sustained pressure from hyperscale cloud providers (e.g. Sungard’s bankruptcy in 2019),...
While there are dozens of metrics available to determine success, here are two key cybersecurity performance indicators every organization should...
Cybersecurity research company Check Point Research says in a report out today that it found security flaws in videoconferencing platform...