Use this template as a means to request and approve proposed exceptions to your security policies.
|
|
Use this workflow to help you formalize and document your policy exception approval process.
|
|
In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19...
|
|
More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers....
|
|
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data...
|
|
IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized roadmap for safe reopening...
|
|
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created...
|
|
The Office of the Attorney General of the State of New York has reached a settlement with Zoom Video Communications. The agreement promises enhanced data security and...
|
|
“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the...
|
|
With its announcement of SvKMS, StorMagic, known for leading-edge storage solutions, has officially entered the security marketplace. SvKMS provides key management for...
|
|