Compliance

binary

Weakened Encryption Will Cause Compliance Chaos

There has been increasing demand from government and law enforcement in recent months for some sort of encryption backdoor. The theory–whether grounded in reality or not–is that an encryption backdoor will allow intelligence agencies to detect and prevent more terrorist […]

Weakened Encryption Will Cause Compliance Chaos Read More »

digital woman

Experts weigh in on ISACA ‘DevOps Practitioner Considerations’

Checklists alone don’t help organizations function better or be more secure. For businesses interested in actually functioning better or being more secure, though, a set of guidelines provides a framework–a solid foundation that lets them track things and make sure

Experts weigh in on ISACA ‘DevOps Practitioner Considerations’ Read More »

Report: Cybersecurity knowledge gap between board and IT is a problem

IT security professionals–the CIOs, CTOs, and CISOs of the world–are generally responsible for implementing and managing security in the trenches. In many organizations, though, its the board that oversees security governance and makes decisions regarding security purchases and policies. A

Report: Cybersecurity knowledge gap between board and IT is a problem Read More »

Scroll to Top