749 Results for:ISO
- Sort by:
Microsoft declares conformance with ISO 27034-1
15 May 2013Microsoft has declared conformance with ISO 27034-1, the first part of an international standard for secure software development Read More
8 data protection challenges and how to prevent them
17 Apr 2024Businesses contend with a combination of issues spawned by data overload, privacy regulations, access rights, cyberattacks, cloud environments, generative AI and human error. Read More
Bank of England’s project to replace ‘beating heart’ is foundation for continuous development
24 Jul 2023The Bank of England has reached a major milestone in its core system replacement programme, with next landmark in sight Read More
Use cURL and Wget to download network files from CLI
13 Oct 2023Web browsers aren't the only tools that use HTTP to download files. Command-line tools, such as cURL and Wget, can download resources like VM images, configuration files and updates. Read More
Green coding - Tricentis: Testing times for suboptimal algorithms & code bloat
12 Mar 2024This is a guest post for the Computer Weekly Developer Network written by Mav Turner, chief product and strategy officer at Tricentis - a company known for its software testing platform aligned to ... Read More
What’s new in ISO 27001: 2103 for storage and backup?
11 Dec 2013This year, ISO 27001: 2013 was published, putting more emphasis on mapping risk to an ever-expanding and mobile IT infrastructure. But what is new in ISO 27001: 2013? Read More
New APT group targets ASEAN governments and militaries
10 Jan 2023The Dark Pink advanced persistent threat group used custom malware to exfiltrate data from high-profile targets through spear-phishing emails last year, according to Group-IB Read More
7 best practices for cloud storage migration
31 Jan 2024While some organizations are moving data back on site, cloud storage is still popular. A successful migration is important -- these best practices and third-party tools could help. Read More
Track evolution in storage security standards, technologies
18 Nov 2022It's going to take a layered approach to handle all the security threats that storage administrators face. Strategies such as zero-trust architecture and encryption can help. Read More
Explaining risk maturity models and how they work
26 Jul 2023Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk and gain a competitive edge. Read More