News

Whether you’re supporting a public or private organization, communication is always the most important ingredient to ensure any meaningful, ...
A component unit for Information Technology, we’re a small team of three full-time ... We implement and administer security tools and services like university-wide vulnerability management, endpoint ...
Organizations need to ensure they have strong leadership guiding their security strategies so they avoid putting themselves ...
Use the links on the left to learn about recent cybersecurity threats and tools and techniques ... To access the Information Security Training Policy, visit the Information Security Training Policy ...
The U.S. Government can take four actions right now that will significantly enhance agencies’ cybersecurity resilience ...
AI tools and integrations are evaluated by CU Boulder’s Information Technology Accessibility and Security Review Process, also known as the ICT Review Process. Learn more about the review and approval ...
Benefits of standardized offerings include: Compliance with CSU and Sacramento State Workstation Security ... with information security tools and requirements, have regular security patching, and are ...
To assist the Division of Information Technology in achieving its vision, Information Security MUST be considered by each and every member of the University community. So, what is Information Security ...
Information security analysts are responsible for protecting information in an organization’s computer systems from data breaches and cyberattacks. Since lots of sensitive data is stored ...