Just like any other organisation, the cybersecurity of the US Department Of Defence (DOD) is only as strong as its weakest link – currently, many of the contractors and subcontractors providing the products and services to the US DoD are not subject to its strict cybersecurity requirements.
As a Human Resources (HR) professional you are involved in the most private aspects of your fellow employees’ work lives. You’re an expert in compensation and benefits, managing numerous uncomfortable topics, such as substance abuse, workplace hostility and unethical behaviour.
Following several large-scale cyber attacks on Australian Governments and Businesses, Cocoon Data hosted an event with the former Defence Minister, the Hon Christopher Pyne, and Cocoon Data’s Chairman and CEO, Trent Telford.
The Federal Government will make the nation’s largest ever investment in cyber security, with $1.35 billion over the next decade to enhance the cyber security capabilities and assistance provided to Australians through the Australian Signals Directorate and the Australian Cyber Security Centre.
Government agencies and U.S. companies are turning to the flexible, scalable and cost-effective option of cloud computing.
Just like facial recognition and voice identification, human fingerprints are biometric identifiers, physical characteristics considered to be unique to each individual.
The laws around social distancing during the COVID19 pandemic have dramatically changed the way we all live and work, relocating most employees from a traditional office environment to working from home.
Whether you have never seen an ITAR Export Controlled Item warning before or you have written one to inform your customers of regulatory restrictions on your products, it is important to understand the regulations involved. The International Traffic in Arms Regulation (ITAR) regulation helps keep American weapons technology safe from bad actors that would use it against us and our allies.