This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...
|
|
Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.
|
|
Management guru Peter Drucker famously said that 鈥測ou can鈥檛 manage what you can鈥檛 measure,鈥 and of course to be successful you need to first define what success looks like....
|
|
All types of collaboration tools have become essential in the wake of COVID-19 and the mass shift to work from home, but some, like instant messaging, present challenges....
|
|
In the real world of 2020, humanity faces a global threat posed by the novel coronavirus. To fight COVID-19, we are calling upon robots to disinfect hospitals and other...
|
|
What do we know about the novel coronavirus? In this note, we summarize what we know about the pathology of SARS-CoV-2, the treatment options currently available, and the...
|
|
A note offering guidance to organizations that have, or endeavor to have, a contract relationship with the United States Department of Defense (U.S. DoD) amid the new...
|
|
An enterprise application selection or implementation has most likely been heavily impacted by COVID-19. Do not hit the brakes; stopping and restarting projects increases...
|
|
The COVID-19 pandemic is an opportunity for cybercriminals as organizations reduce focus on security protocols due to time-sensitive remote access initiatives. SIEM can...
|
|
IT changes are inevitable, even in a crisis mode. Service Desk and IT operations will feel overburdened, but when it comes to change management, skipping steps for...
|
|