We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at...
|
|
“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the...
|
|
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created...
|
|
IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized roadmap for safe reopening...
|
|
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data...
|
|
In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19...
|
|
Use this RACI chart to keep track of responsibility and accountability for tasks related to your Information Security Steering Committee.
|
|
Use this tool to help you track ongoing exceptions to your security policies.
|
|
Use this template as a means to request and approve proposed exceptions to your security policies.
|
|
Use this workflow to help you formalize and document your policy exception approval process.
|
|