Search
You can find the results of your search below.
Matching pagenames:
Fulltext results:
- IT Security Policy @pub:trust_center:policies
- ====== IT Security Policy ====== //Effective date: 17.05.2024.// Security is very important to Unicis and everyone here is ... data secure. This document describes our internal security policies, and minimum security baseline and how those translate into creating a secure platform, add-ons an
- Releasing @pub:development
- rged PRs from bumped dependencies unless they fix security issues or are otherwise notable. Remove merged PR... rged PRs from bumped dependencies unless they fix security issues or are otherwise notable. Remove merged PR... rate Release Notes// feature ===== Preparing a Security Release ===== * Create a draft GitHub Security advisory ++++ Template | ==== Summary ==== Short summar
- Unicis Open Positions @pub:recruitment
- About Us ==== Unicis is building a cutting-edge Security Operations Center (SOC) using an open-source tech... re seamlessly integrated to provide comprehensive security monitoring and alert management capabilities. You... ng up automation workflows, and ensuring that all security alerts are reported and managed through the Zabbi... igure Zabbix to handle, display, and act upon all security alerts. * Develop and maintain Docker Compose s
- Vendor Questionnaires @pub:trust_center
- n place to accept and process external reports of security issues in your products and/or services? //If ye... Do you perform annual reviews of your application security controls for each qualifying product or service t... Training === Do you provide regular and ongoing security awareness training for your employees? //If yes,... ocesses in place to ensure the smooth handling of security and privacy incidents? //If yes, please describe
- Predrag Tasevski (predrag) - Public Page @user
- and CEO// <WRAP group> <WRAP half column> **Cyber Security & Privacy by Design Advocate | Certified ISO, DPO... , and more** Predrag has worked in cyber and IT security for more than a decade. He knows how to make security and privacy work by design and default. He also knows... chain projects. Working as a director, head of IT security, ISO, senior cloud security engineer, and consult
- What is Unicis? @pub
- al intelligence to change the way legal, privacy, security, and risk teams work. We are committed to providi... serves as a hub that simplifies the management of security, privacy, risk, and compliance functions. We ar... that addresses all compliance, privacy, risk, and security concerns. {{tag>vision}} ===== Mission ===== Ou... mprehensive solution that streamlines compliance, security, risk, and privacy management through the integra
- Communications @pub:company
- sified according to the [[https://www.unicis.tech/security#data-classification|Security Policy]] and the categories define who can access the information. * **Publ... rations, and/or the people involved. e.g., social security numbers during hiring ===== Email relays ===== ... ===== Vendor questionnaires ===== In response to security questionnaires, Unicis strives to provide full tr
- Introduction to Development @pub
- testing to ensure functionality, performance, and security. ++++ ++++ Continuous Integration/Continuous Dep... maintainable, and easy to collaborate on. ===== Security Practices ===== Security is paramount in safeguarding sensitive data and ensuring compliance with industry regulations. Implementing robust security measures, such as encryption protocols, access co
- DevOps @pub:development
- ud (VPC) for secure networking. * **Subnets and Security Groups**: Define subnets and configure security groups to control inbound and outbound traffic. * **Load ... process to ensure quality and consistency. * **Security**: Regularly update dependencies and apply security patches. * **Backup and Recovery**: Set up regular ba
- Processes and Procedures @pub:trust_center
- tings and via communication tools. ===== 8. Data Security and Confidentiality ===== * **IT Security Policy:** Follow the [[it_security_policy/|IT Security Policy]]. ===== 9. Technical Support ===== * **Help Desk:** Provide a [[tech_stack_
- Products @pub:company
- arallel. Every product group is responsible for security and privacy by default and by design, performance... | | IANASP | "I am not a security & privacy expert", but I smell security and privacy issues | ==== Planned and unplanned chang
- Tech Stack Applications @pub:operations
- ssible. If it is not possible, please request the Security and Privacy Review. </WRAP> ====== Yunohost - SS... 2) **URL:** https://wazuh.com/ The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads. {{tag>siem xdr security vulnerability compliance}}
- Content Unicis Handbook
- |Policies]] * [[pub:trust_center:policies:it_security_policy|IT Security Policy]] * [[pub:trust_center:policies:privacy_policy|Privacy Policy]] [[pub:opera
- Unicis Onboarding Training
- s Onboarding Training ====== - [[onboarding:it_security_policy|IT Security Policy]] - [[onboarding:privacy_policy|Privacy Policy]]
- Unicis SOC Plan @pub
- critical infrastructure issues that may indicate security concerns. * TheHive + Shuffle SOAR: * Use... ations ==== * Zabbix Dashboards: * Combine security alerts from Wazuh with performance metrics from Z