OUR BLOG
News and Insights
The latest industry news, interviews, technologies, and resources.
Public Comments are open for TX-RAMP Security Controls Baseline Level 2
The UCF Team invites you to review and provide feedback on the mapping of TX-RAMP Security Controls...
Public Comments have closed for ISO/IEC 27005:2018, Information Technology — Security Techniques — Information Security Risk Management, Third Edition
The Public Comment period for ISO/IEC 27005:2018, Information Technology — Security Techniques —...
6 new Authority Documents have been added to the UCF
TX-RAMP Security Controls Baseline Level 1 AD ID: 3419 Status: Released Availability: Free Citation...
Public Comments have closed for Mississippi Code Annotated, Title 83, Chapter 5, Article 11, Sections 801 - 825, Insurance Data Security Law
The Public Comment period for Mississippi Code Annotated, Title 83, Chapter 5, Article 11, Sections...
Public Comments have closed for Ohio Revised Code, Title 39, Chapter 3965, Sections 1-11, Cybersecurity Requirements For Insurance Companies
The Public Comment period for Ohio Revised Code, Title 39, Chapter 3965, Sections 1-11,...
Public Comments are open for TX-RAMP Security Controls Baseline Level 1
The UCF Team invites you to review and provide feedback on the mapping of TX-RAMP Security Controls...
Public Comments are open for Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology, NIST SP 800-40, Revision 4
The UCF Team invites you to review and provide feedback on the mapping of Guide to Enterprise Patch...
Public Comments are open for CIS Amazon Linux 2 Benchmark, v.2.0.0, Level 1
The UCF Team invites you to review and provide feedback on the mapping of CIS Amazon Linux 2...
Public Comments have closed for New Hampshire Revised Statutes, Title XXXVIII, Chapter 420-P, Sections 1-14, Insurance Data Security Law
The Public Comment period for New Hampshire Revised Statutes, Title XXXVIII, Chapter 420-P,...