Information security

Results: 50180



#Item
291

Symantec Expands Portfolio with New Protection Suites and Web Security Protects endpoint, web and messaging environments to secure against today’s complex Internet threats and quickly recover information in the event o

Add to Reading List

Source URL: www.bandangels.com

- Date: 2009-04-29 19:57:56
    292

    COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to the DEPARTMENT OF HOMELAND SECURITY Freedom of Information Regulations 6 CFR Part 5 [Docket No. DHS]

    Add to Reading List

    Source URL: epic.org

    - Date: 2015-09-29 16:34:48
      293

      UC Privacy and Information Security Initiative

      Add to Reading List

      Source URL: regents.universityofcalifornia.edu

      - Date: 2015-07-20 18:27:27
        294

        Wadham College Information Security Policy 1. Introduction In July 2012 the University of Oxford approved its Information Security policy that had been created

        Add to Reading List

        Source URL: www.wadham.ox.ac.uk

        - Date: 2015-09-07 06:56:09
          295

          Secure Your Business CIS – Certification & Information Security Services GmbH – Ltd.

          Add to Reading List

          Source URL: www.cis-cert.com

          - Date: 2014-01-21 11:10:38
            296

            Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

            Add to Reading List

            Source URL: www.atsec.com

            - Date: 2015-09-14 07:32:35
              297

              VICTORIAN PROTECTIVE DATA SECURITY FRAMEWORK (VPDSF) INFORMATION SECURITY GUIDE Information Security Guide

              Add to Reading List

              Source URL: www.cpdp.vic.gov.au

              - Date: 2016-07-03 21:54:17
                298

                This Organization Participates in E-Verify This SWA will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each applicant’s Form I-9 to

                Add to Reading List

                Source URL: grande.com

                - Date: 2016-04-27 13:55:24
                  299

                  Information Technology Services Associate Vice President & CIO Terry Vahey Customer Service & Information Security

                  Add to Reading List

                  Source URL: its.sjsu.edu

                  - Date: 2016-08-22 13:21:04
                    300

                    ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

                    Add to Reading List

                    Source URL: csrc.nist.gov

                    - Date: 2016-08-23 14:55:14
                      UPDATE