OUR BLOG
News and Insights
The latest industry news, interviews, technologies, and resources.
Compliance as Code: Custom Corporate Dictionaries, webinar series #5
Join us January 20 at 10:00 am, pacific time.
Public Comments are open for Guidelines on Outsourcing
The UCF Team invites you to review and provide feedback on the mapping of Guidelines on Outsourcing.
2 new Authority Documents have been added to the UCF
IEC 62443-4-2: Security for industrial automation and control systems - Part 4-2: Technical...
Public Comments are open for Financial Crime Guide: A Firm’s Guide to Countering Financial Crime Risks, Release 11
The UCF Team invites you to review and provide feedback on the mapping of Financial Crime Guide: A...
5 new Authority Documents have been added to the UCF
ISO 27001:2013, Information Technology - Security Techniques - Information Security Management...
Public Comments are open for IEC 62443-4-2: Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS components, Edition 1.0
The UCF Team invites you to review and provide feedback on the mapping of IEC 62443-4-2: Security...
Public Comments are open for IEC 62443-4-2: Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS components, Edition 1.0
The UCF Team invites you to review and provide feedback on the mapping of IEC 62443-4-2: Security...
Public Comments are open for IEC 62443-3-3: Industrial communication networks – Network and system security – Part 3-3: System security requirements and security levels, Edition 1
The UCF Team invites you to review and provide feedback on the mapping of IEC 62443-3-3: Industrial...
Public Comments are open for Circular to Licensed Corporations - Use of external electronic data storage
The UCF Team invites you to review and provide feedback on the mapping of Circular to Licensed...