搜索优化
English
搜索
Copilot
图片
视频
地图
资讯
购物
更多
航班
旅游
酒店
房地产
笔记本
Top stories
Sports
U.S.
Local
World
Science
Technology
Entertainment
Business
More
Politics
时间不限
过去 1 小时
过去 24 小时
过去 7 天
过去 30 天
按相关度排序
按时间排序
COBIT
42 分钟
Five Ways Privacy Professionals Can Start the New Year Strong
Privacy professionals must embrace change in the evolving technology and regulatory landscape, turning risks and ...
COBIT
23 小时
Five Ways Risk Professionals Can Start the New Year Strong
Identifying and leveraging reliable information sources is a useful starting point for risk professionals looking to solidify their good practices for the year ahead.
COBIT
1 天
Cybersecurity Trends to Watch in 2025
There is no crystal ball to forecast the future; however, organizations can make informed predictions about cybersecurity in ...
COBIT
12 天
Shedding Light on Shadow IT: Aligning Goals for Organizational Success
A disconnect between the goals of the IT team and business units can open the door to the usage of more shadow IT solutions, ...
COBIT
7 天
Cybersecurity Leadership Challenges in an Evolving Threat Landscape
Cybersecurity leaders are tasked with an additional undertaking that most leaders are not: thwarting bad actors.
COBIT
5 天
Five Ways Audit Professionals Can Start the New Year Strong
A fresh start for IT auditors in 2025 is possible, but closing out lingering loose ends from last year likely requires ...
COBIT
9 天
Overreliance on Automated Tooling: A Big Cybersecurity Mistake
Automation and artificial intelligence (AI) have been a positive force multiplier in the cybersecurity industry. Improved ...
COBIT
7 天
Leveraging Artificial Intelligence for Enhancing Security and Privacy in Modern Computing ...
Artificial intelligence can play a significant role in enhancing the security and privacy disciplines, but governance and ...
COBIT
7 天
Information Security Matters: NIST CSF 2.0 and the Cybersecurity Hierarchy
NIST CSF 2.0 calls for a hierarchy of executives, managers, and practitioners not stated in the previous version.
COBIT
7 天
The Digital Trust Imperative: Assume Breach to Gain Advantage
A breach can happen at any time and it is not always a sophisticated attack. The recommendation within cybersecurity today is ...
COBIT
7 天
Employing Automation for Incident Response Planning
The ever-growing complexity and frequency of cyberattacks have forced organizations to rethink their strategies for managing ...
COBIT
13 天
Five Key Priorities for Governance Practitioners in 2025
In the modern technology environment, governance professionals have to be attuned to much more than traditional IT governance ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果
反馈