One of the key elements of ISO 27001 certification involves doing a comprehensive risk assessment. In order to combat the risks to your organization’s assets, you need to identify the assets, consider ...
Risk assessment (RA) is akin to charting the blueprint for a robust information security strategy. An information gathering exercise performed to determine the right steps to developing a proactive ...
If your Unix/Linux servers are to be involved in an ISO 27001 audit, there are a lot of things you should be doing ahead of time to ensure that they won’t end up generating findings. While there are ...
Organizations collect, store and process vast amounts of data today. Employee information, supplier information, customer information, intellectual property, financial records, communication ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results