The extent to which the Department of Homeland Security’s (DHS) National Cybersecurity and Communications Integration Center (NCCIC) has taken steps to perform each of its 11 statutorily required ...
Nearly three out of four organizations now include cybersecurity risks in their internal audits, a big jump from last year, according to a new survey. The annual survey, by the consulting firm ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
Cybersecurity ranks among the top priorities for audit committees, enterprise risk management, and finance and internal audit talent, outside of financial reporting and internal controls, according to ...
With the RSA Cybersecurity Conference right around the corner from our office in San Francisco, it seems only fitting that the March article focuses on cybersecurity. Long gone are the halcyon days of ...
Businesses often view data security audit as a stressful and intrusive process. An auditor walks around distracting everybody and meddling in regular company operations. The usefulness of conducting ...
This five-part series provides an introductory roadmap to the California Consumer Privacy Act’s (CCPA) new cybersecurity audit requirement and the California ...
Cybersecurity threats are expected to rise in 2020. It’s never been more important for companies to stay on top of their security processes. One way to make sure your data and systems are properly ...
Very disappointing, some might even say demoralizing, security findings were made public this week in a report from a U.S. Government Accountability Office cybersecurity study regarding the Defense ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results