IT security, cybersecurity and privacy protection are vital for companies and organizations today. Our information security standards keep them safe.

Insights

Information security: A pillar of resilience in a digital age

In a digitally connected world, your business data isn’t just essential – it’s a cornerstone of value creation. But this invaluable resource faces relentless cyber threats.

Threat intelligence and why it matters for cybersecurity

Most organizations today stick to the most basic form of threat intelligence (e.g. threat data feeds, IPS, firewalls), without enjoying the full advantage of what intelligence has to offer. When properly addressed, actionable CTI opens a world of opportunities. 

What is access control?

A key component of information security, access control allows for streamlined control of movement around facilities or networks. In other words, it restricts the areas people can and cannot enter – be it a room or a computer.

Sample standards

Information technology — Common Biometric Exchange Formats Framework
Part 4: Security block format specifications

Information technology — Extensible biometric data interchange formats
Part 5: Face image data — Amendment 1

Information technology — OpenID connect — OAuth 2.0 multiple response type encoding practices

Information technology — OpenID connect — OAuth 2.0 form post response mode

Information technology — OpenID connect — OpenID connect front-channel logout 1.0

Information technology — OpenID connect — OpenID connect back-channel logout 1.0 incorporating errata set 1