About 296,000 results
Open links in new tab
  1. Information Security Continuous Monitoring (ISCM) for Federal ...

    Sep 30, 2011 · The purpose of this guideline is to assist organizations in the development of a continuous monitoring strategy and the implementation of a continuous monitoring program …

  2. Log Management | CSRC - NIST Computer Security Resource Center

    Apr 28, 2021 · NIST is in the process of addressing public comments on Draft Special Publication (SP) 800-92 Revision 1, Cybersecurity Log Management Planning Guide. The purpose of this …

  3. Mitigating Cybersecurity and Privacy Risks in Telehealth Smart …

    Nov 6, 2024 · This paper examines privacy and cybersecurity risks found in HaH deployments when using smart speakers as a representative IoT device and provides recommended steps to …

  4. Measurements for Information Security | CSRC

    SP 800-137A Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations This publication describes an approach for the development of Information …

  5. SP 800-92, Guide to Computer Security Log Management | CSRC

    Sep 13, 2006 · The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information security …

  6. Security and Privacy Controls for Information Systems and …

    Dec 10, 2020 · This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other …

  7. Cybersecurity Log Management Planning Guide - NIST Computer …

    Oct 11, 2023 · A log is a record of events that occur within an organization’s computing assets, including physical and virtual platforms, networks, services, and cloud environments. Log …

  8. Forum Presentation - Information Security Continuous Monitoring ...

    Dec 21, 2010 · Integrates information security more closely into the enterprise architecture and system life cycle. Promotes near real-time risk management and ongoing system authorization …

  9. Fundamentals of Continuous Monitoring - NIST Computer Security …

    Jun 5, 2013 · Continuous Monitoring Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.

  10. Assessing Information Security Continuous Monitoring (ISCM) …

    May 21, 2020 · This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate …