As governments look to regulate the online world, the scrutiny of the algorithms that sit behind popular websites and apps is only going to increase. With doubts over whether self-regulation can ever ...
A data storage strategy that addresses data sovereignty builds on the classification of data in the data audit to limit what data can go where. As part of the classification process, data will be ...
As the manager of IT Audit, Greg Loge aims to ensure UC Davis computer networks are equipped with safeguards like firewalls, such as the one running on the monitor behind him, regulating traffic in ...
If you are like most administrators, you want to know who is logging on, to which computer, and accessing resources on your servers. For your Windows computers and Active Directory environment, you ...
Carol Hall failed one of the first computer auditing exams she ever took, miserably. But it did not stop her from going on to establish a career in auditing and also co-found the Bermuda chapter of ...
The computer network for the city of Hartford is in need of major safety and security upgrades. The NBC Connecticut Troubleshooters obtained a report, written by the Hartford Internal Audit Department ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results