The Government Accountability Office (GAO) has released a report indicating that the implementation of the Federal Information Security Modernization Act of 2014 (FISMA) by federal agencies remains ...
Last week, I talked about the emergence of metrics in the management of IT risks. I asked for your feedback, and (thank you all very much!) I’ve already gotten many interesting responses from readers ...
How do we manage what we can’t measure? One of the cornerstones of the scientific method is measurability: a focus on defining the ways of counting or measuring aspects of reality that we hope will be ...
Expertise from Forbes Councils members, operated under license. Opinions expressed are those of the author. The chief information security officer (CISO) role has matured significantly over recent ...
How do we manage what we can’t measure? One of the cornerstones of the scientific method is measurability: a focus on defining the ways of counting or measuring aspects of reality that we hope will be ...
SAN JOSE, Calif.--(BUSINESS WIRE)--Cohesity, a leader in data security and management, today announced Cohesity Catalyst, the leading data security and management summit, will be held as a three-day ...
Data security posture management (DSPM) tools help security teams to look at the entire data environment and find shadow data, reducing the risk of data loss. Tracking down sensitive data across your ...
From vendors offering identity and data security to providers of security service edge, here’s a look at 20 key companies in identity, access and data security. If the growth of the identity and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results