Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
Finding a good IT auditor can be as important to your company as choosing the right attorney or insurance agent. Auditors can safeguard your business against potentially fatal errors – guiding you to ...
Before he became a chief technical security officer at Qualys, Josh Hankins was a cybersecurity leader in financial services. He learned how security audit failures are increasingly costly, and he ...
(TNS) — On Christmas Eve last year, Washington State Auditor Pat McCarthy's office issued a dire warning that state agency computer systems and data make "attractive targets for cyberattacks." The ...
The California State Auditor has issued a stinging report that faults the California Department of Technology (CDT) for its oversight of state agencies’ information security — the Auditor’s sixth such ...
Over the past few months, I have received a number of questions that seem to focus on the difference between a security assessment and a security audit. These are two significantly different things.
Accelerate your tech game Paid Content How the New Space Race Will Drive Innovation How the metaverse will change the future of work and society Managing the Multicloud The Future of the Internet The ...
Information security audits are on the rise, as organizations look to not only bolster their security postures, but demonstrate their efforts to other parties such as regulators. Audits, which are ...
Large organizations may have hundreds of servers and thousands of computers as clients of those servers. Ensuring the security of such a vast array of computers and the data stored thereon is a big ...
Professional auditor Shawn Bernard of Networks Unlimited exposes risks overlooked by IT staff of a New England medical center. Only a security audit can expose the truth about a network’s ...