Companies are not following simple data security procedures in seven high-risk scenarios, according to new research announced today by the Ponemon Institute, a privacy and information management ...
Get the latest federal technology news delivered to your inbox. The Environmental Protection Agency cited a lack of resources and the sheer volume of critical vulnerabilities as the reasons for its ...
The majority of companies deploying cloud computing solutions have no cloud-specific security policies and procedures in place and have no measures to approve or evaluate cloud applications that use ...
As each year passes and technology advances, businesses face an increasingly difficult task to maintain adequate security measures to protect their organizations’ assets and data. With this in mind, ...
The University at Buffalo Data Technology Office (UBIT)’s Information Security Program identifies and describes goals, expectations, roles, and responsibilities with respect to information security ...
This Written Information Security Program describes the safeguards implemented by DePauw University to protect confidential data. The goal of the program is to ensure the security of these assets to ...
Information and data constitute valuable Connecticut College assets. The purpose of data governance is to establish a culture that ensures institutional data is both secure and available to those who ...
In Patco Construction Co., Inc. v. People's United Bank, a federal court ruled that failing to review and respond to security alerts may render a bank's information security procedures commercially ...
CHESAPEAKE, Va. - Chesapeake Regional Healthcare experienced a data security incident from February 7 that may have intermittently reoccurred until May 20, the organization said. Officials ...
A data security threat is any action that could jeopardize the confidentiality, integrity or availability of data. Data security threats can come from a variety of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results