With technology advancing rapidly and new threats taking shape, zero trust, a security strategy based on continuous authentication, has become a major priority for the Department of Defense. In ...
Many years ago, I attended a great training course. The course was called “Consulting for Organizational Effectiveness,” and I’ll never forget a question asked by the instructor. He asked us to ...
The Information Security Forum (ISF) has issued its GDPR Implementation Guide, with best practices for guiding a compliance program ahead of the European Union’s General Data Protection Regulation ...
‘The President’s letter dated 8 June 2020 regarding the virtual ceremony to mark the commemoration of the signing of the Charter of the United Nations to be held on 26 June 2020;P The General Assembly ...
Organisations have often tried to begin reporting on complex sustainability areas without addressing their business's operational aspects, leading to poor reporting and implementation. For many ...
The National Science Foundation and the White House Office of Science and Technology Policy have asked the public to comment on a plan to implement a research infrastructure that would provide ...
The government has published an ‘implementation roadmap’ for the Employment Rights Bill, confirming that, once the Bill has made it onto the Statute Book, significant changes will arrive from as soon ...
Defining an overall approach to security helps you avoid the pitfalls of simply throwing a bunch of point solutions at various problems. This Excel-based tool will help you develop an enterprise ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results