News

Learn how to make your information security program scalable, effective, and aligned with your business strategy and culture, using strategies and best practices from the industry.
Moving from reactive, short-term cybersecurity projects to a proactive, coordinated information security program requires an overarching mission, clear objectives, and a strategy that improves the ...
Definitions of the different levels of security used to protect sensitive government information, assets and work sites.
Information technology (IT) security requirements are designed to safeguard the confidentiality, integrity and availability of protected and classified information. IT security is required for ...
Training for a marathon is a lot like preparing for a potential security breach.
About Graduate Certificate - Information Security If you're looking to level up your career in information technology by specializing in information security, Athabasca University has the perfect ...
One chart tells you all you need to know about Social Security’s troubles.
A security program is a set of activities, projects and initiatives designed to protect critical business processes, data and information technology assets.
An iterative approach to a security program takes advantage of regular audits to find problems and address them according to risk and priority of each lapse identified. The IT organization's security ...