The Information Security Forum (ISF), the International Information Systems Security Certification Consortium (ISC)², and ISACA have teamed to develop a set of 12 information security principles to ...
Under federal, state, regulatory, and contractual requirements, Michigan Tech is responsible for developing and implementing a comprehensive information security program. The purpose of this document ...
Information, influence and narratives have played a vital role in conflicts throughout human history. Genghis Khan notably favored influence operations, allowing his soldiers to become operatives who ...
With five years of experience as a writer and editor in the higher education and career development space, Ilana has a passion for creating accessible, relevant content that demystifies the higher-ed ...
In information security, we have a concept called the C.I.A. No, not that CIA -- it's the information security triad of confidentiality, integrity and availability. Maintaining the confidentiality, ...
In the piece I wrote in December (“What the Sony breach means for security in 2015″), I noted that while a good CISO is important; great security architects are critical. While a CISO may get the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results