How do we manage what we can’t measure? One of the cornerstones of the scientific method is measurability: a focus on defining the ways of counting or measuring aspects of reality that we hope will be ...
What are the nuclear security considerations that the extensive use of advanced digital systems and information-technology features bring with them? How do nuclear security regulations address risks ...
With the increase in cyber-attacks and information security breaches – 72% of large UK firms identified an information security breach in 2018, a rise from 68% from 2017 – the importance of protecting ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More More industries are incorporating blockchain applications into their ...
Tax and accounting professionals have a new resource for implementing or improving their written information security plan, which is required under federal law. The IRS in a news release Tuesday ...
Understanding your enemy is often the best way to defeat it, especially in cybersecurity. In this evolving threat landscape, where 35% of attacks exploit a company’s security vulnerabilities, security ...
The title of Chief Information Security Officer, or CISO, emerged during the 1990s as the first large-scale cyber attacks started to occur. Since then, it's become a near-ubiquitous role in any large ...
Every aspect of technology selection, deployment and management has changed over recent years. Our networks are increasingly distributed. Applications that once would never have been ‘outsourced’ are ...
January 25, 2023 - The Federal Trade Commission (FTC) announced a delay to the date of several of the amendments under § 314.5 to the Gramm-Leach-Bliley Act's (GLBA) Safeguards Rule, which requires ...
The Federal Trade Commission (FTC) has ordered Marriott International and Starwood Hotels to define and implement a robust customer data security scheme following failures that led to massive data ...