Connect with us

Hi, what are you looking for?

Cyber Security

This program is aimed at preventing unauthorized access to systems and applications. A.9.4.1 Information Access Restriction Control– Clearly defining access controls to information and...

Information Privacy

ISO/IEC 27562 — Information technology — Security techniques — Privacy guidelines for fintech services [Draft] Introduction According to the proposed 1st working draft: Fintech...

Information Privacy

ISO/IEC TS 27560 — Privacy technologies — Consent record information structure [Draft] Introduction For recording PII Principals’ (data subjects’) consent to data processing, this...

Information Privacy

ISO/IEC 27402 — Cybersecurity — IoT security and privacy — Device baseline requirements [Draft] Introduction This project documents the basics of IoT security, enabling...

Cyber Security

Information technology — Security techniques — Security guidelines for establishing trusted connections between device and service [Draft] Introduction The standard aims to provide trustworthy...

Information Security

Information technology — Security techniques — Criteria for establishing virtualized roots of trust [Draft] Introduction In trusted computing, a Hardware Security Module provides various...

Information Security

ISO/IEC 27045 – Information technology — Big data security and privacy — Processes [DRAFT] Introduction It was intended to improve the ability of organizations...

Information Privacy

ISO/IEC 27559 — Privacy-enhancing data de-identification framework [Draft] Introduction The standard outlines a non-prescriptive framework that can be used to identify and mitigate risks...

Governance

ISO/IEC 27038:2014 – Information technology — Security techniques — Specification for digital redaction Introduction For reasons such as the release of official documents under...

Information Privacy

ISO/IEC 27556 — Information security, cybersecurity and privacy protection — User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences...

More Posts
Advertisement Advertisement
  • solutions-inc
  • solutions-inc
  • solutions-inc
  • solutions-inc
Advertisement Advertisement
  • solutions-inc
  • solutions-inc
  • solutions-inc
  • solutions-inc