"Where do I find database security benchmarks?" That was the question posed to me this week when discussing database security assessment. It's an odd question for database administrators (DBAs) ...
The purpose of this policy is to establish standard procedures to secure mobile devices to prevent data loss should they be lost or stolen. This policy applies to all schools, departments, employees ...
HERSHEY, Pa.--(BUSINESS WIRE)--The Center for Internet Security (CIS) today announced the public release of its consensus security benchmarks for the Apple iPhone and Multi-Function Devices (MFD). The ...
Security guidelines provided by IT Purdue Systems Security incorporating guidance from Purdue policies and standards, CIS Controls, and mitigating controls against known incidents. Use VPN or other ...
Appendix A: Server Security Compliance Checklist (Login required: IT Staff only) Appendix B: Security and Configuration Management Tools (Login required: IT Staff only) All university owned devices, ...
In today's connected world, securing industrial control systems (ICSs) is more important than ever. Industrial control system cybersecurity standards like NERC CIP, ISA-99 (IEC-62443), and NIST 800-82 ...
The tech can provide evidence of compliance with configuration standards and detect anomalies in complex multi-tenant, multi-cloud computing architectures. Cloud service providers and mobile operating ...
Germany's cyber-security agency is working on a set of minimum rules that modern web browsers must comply with in order to be considered secure. The new guidelines are currently being drafted by the ...
Washington, DC " December 16, 2009 " The Center for Internet Security (CIS) today announced that John Gilligan has been elected chairman of the board effective November 3, 2009. Mr. Gilligan is ...
A working group of representatives from IT trade and security organizations is calling for federal agencies to use their massive buying power to force IT vendors to build more secure products. The ...