Relationships are key to developing effective security playbooks to stay one step ahead of emerging digital threats. As the ...
On May 31, 2025, the Alberta Security Management for Critical Infrastructure Regulation (the Regulation) will come into force and is expected to alter existing security requirements for critical ...
From the South to the Northeast, governments are taking decisive action to strengthen cybersecurity through new legislation designed to modernize systems, while protecting sensitive data and making ...
Following a national search, the Georgia Institute of Technology has selected Joseph “Joe” Lewis as its new associate vice president of Information Technology and chief information security officer.
If you are conducting research or collecting information from third parties, there are some steps that you need to follow to ensure that your data is being protected appropriately and that Harvard ...
The Data & Privacy Team is here to support you and answer any questions you may have about information security threats, policies, or best practices. We want to help ...
In the months surrounding UnitedHealth Group Inc.’s $13 billion purchase of software company Change Healthcare Inc. in 2022, experts at Change published articles and policy papers extolling the need ...
The US system to track vulnerabilities is struggling to keep up with its backlog. Experts are scrambling to assemble alternatives. Every day, billions of people trust digital systems to run everything ...
The Government Technology & Services Coalition’s (GTSC) Homeland Security Today this morning welcomes former Chief Information Security Officer at the U.S. Department of Homeland Security, Kenneth ...
Assistant Professor of Information Technology Management Mahesh Boodraj had his paper, “ Beyond Passwords: A Review of the ...