News

To secure valuable data, organizations need to implement digital trust in software supply chains; however, several key ...
The paradigm of digital–physical systems, called cyber–physical systems (CPS) by ISO, has evolved significantly. CPS ...
The convergence of information technology (IT) and operational technology (OT) is rapidly changing the industrial landscape ...
Two of the most significant challenges in remote auditing are enabling key relationships and accessing information. But ...
What happens if weaknesses in an organization's monitoring and detection capabilities cloud visibility so severely that it has no idea how much risk it is truly absorbing?
The evolution of technology has transformed human–machine relationships, resulting in an unprecedented computing environment ...
Can organizations balance harnessing the value of data with protecting consumer privacy? What is the balance between the ...
Certified Information Security Manager (CISM) certification holders give advice to those considering becoming CISM certified.
A review of the quality audit process from what triggers an audit, what an audit entails, and what are the possible results of the audit.
This is intended to be a 2-part CMMI Tech Talk on CMMI Practice Area Managing Security Threats and Vulnerabilities (MST). Related Tech Talk- CMMI Tech Talk: CMMI Model Deep Dive: Managing Security ...
Review of the Process Quality Assurance (PQA) Practice Area. We will discuss the intent of this Practice Area and look at what value it can provide to an organization, as well as looking at the ...
After attending 2015 CSX Europe, attendees give testimonials about their experience.