In today’s world of interlocked companies and IT service providers, it’s standard practice for a company to ask its tech suppliers to fill out detailed questionnaires about their security practices.
Too many healthcare providers fail to conduct comprehensive, timely risk assessments, as required under HIPAA as well as the HITECH Act, says security consultant Kate Borten, president of The ...
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
Security is a fundamental human need. When people feel safe, they are likely to be more productive, perform better at work and school, and have overall better physical and mental well-being. Campus ...
Brown University says its new security initiatives include an after-action review, campus security assessment, and technology improvements.
In 2017, the Security Leadership Research Institute (the Security Executive Council’s research arm) asked security practitioners to choose from a list of which risk-related activities their security ...
Following the senseless Dec. 13 shooting on campus, the University will conduct an external After-Action Review of the ...
Under a recently enacted California law, local education agencies and individual schools can request that the California Military Department (CMD) conduct independent security assessments to root out ...
Higher education institutions are in a vulnerable position when it comes to cybersecurity. In an alert issued by the FBI earlier this year, the nation’s top law enforcement agency warned that agents ...
Paxson’s email comes just after the U.S. Department of Education announced that the Office of Federal Student Aid is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results