Skip to content
  • ANSI Webstore
  • Accreditation
  • Training
Facebook Instagram YouTube Linkedin X Threads Pinterest Tumblr TikTok
The ANSI Blog
Search
  • Latest
  • ANSI Blog
  • ANAB Blog
  • Workcred Point of View
  • Customer Service
The ANSI Blog
A blue lock pixelated graphic representing ISO/IEC 27701:2025.
ANSI | Information Security / ISO 27000

ISO/IEC 27701:2025 – Privacy Information Management Systems

ByBrad Kelechava October 4, 2019October 22, 2025

Like a shadow of pixels, your digital presence is an extension of you. Unfortunately, data breaches are rampant. 2023 set the record for reported data…

Man accessing the ISO/IEC TS 27008:2019 document for information security controls while connected city flourishes on the side.
ANSI | Computer Science | Information Security / ISO 27000

ISO/IEC TS 27008:2019 – Technical Specification on the Assessment Of Information Security Controls

ByBrad Kelechava January 30, 2019June 5, 2025

An ISO technical specification, ISO/IEC TS 27008:2019 – Information Technology – Security Techniques – Guidelines For The Assessment Of Information Security Controls, has been released….

Stacked wooden blocks with an icon representing a person on them. One block is brought into view with a magnifying glass which represents protecting personally identifiable information as specified in ISO/IEC 27018.
ANSI | Computer Science | Information Security / ISO 27000

ISO/IEC 27018:2025 – Code Of Practice For Protecting Personally Identifiable Information (PII) In Public Clouds

ByBrad Kelechava January 29, 2019October 22, 2025

The Internet has advanced the global economy immensely, and the emergence of various web-connected devices or “things” accelerates the delivery of technology’s many benefits for…

Robot made of various parts and exposed gears to symbolize ISO IEC 29147 2018
ANSI | Computer Science | Information Security / ISO 27000

ISO/IEC 29147:2018 – Vulnerability Disclosure in Information Technology

ByBrad Kelechava November 16, 2018May 30, 2025

Vulnerabilities are undesirable in all facets of life. In fact, the word “vulnerable” derives from the Latin vulnus, meaning “wound.” For information technology and cybersecurity…

Customer service employees happy to follow ISO 20000-1:2018 for service management systems
ANSI | Quality Management

Changes to ISO/IEC 20000-1:2018 – Service Management System (SMS) Requirements

ByBrad Kelechava November 8, 2018May 30, 2025

They say the customer is always right. Those who have dealt with some frustrated purchasers may disagree. Nonetheless, the benefits of successful customer service cannot…

SQL code reflecting in man's glasses and specified in ISO IEC 9075 2016
ANSI | Computer Science

The SQL Standard – ISO/IEC 9075:2023 (ANSI X3.135)

ByBrad Kelechava October 5, 2018July 16, 2025

SQL (standing for Structured Query Language) is the standard language for relational database management systems. When it originated back in the 1970s, the domain-specific language…

A child watching a video that follows ISO/IEC 14496 on a couch
ANSI | Computer Science

ISO/IEC 14496 Standards for MPEG-4, or “Coding of Audio-Visual Objects”

ByBrad Kelechava April 18, 2018May 29, 2025

In other posts, we discussed the MPEG-1 and MPEG-2 standards, as well as their respective corresponding international standard documents. Initially introduced in 1998, MPEG-4 absorbed…

Computer server that is managed by ISO IEC 270032017
ANSI | Computer Science | Information Security / ISO 27000

ISO/IEC 27003:2017 – ISMS Guidance

ByBrad Kelechava May 31, 2017May 29, 2025

Most organizations today have no choice but to maintain a digital presence, utilizing services that, for the most part, capture the benefits of their activities…

Plenty of blue code representing an ISO 27001 information security management system (ISMS).
ANSI | Computer Science | Information Security / ISO 27000

Information Security Management System (ISO/IEC 27000 Series)

ByBrad Kelechava January 3, 2017May 28, 2025

Information security is integral to any active organization, and, as businesses around the world enact a greater network-based presence while facing a growing number of…

Page navigation

Previous PagePrevious 1 2 3 4 Next PageNext

About Us

The statements made in ANSI blogs are those of the authors and do not reflect the official policy or position of ANSI.

Powered by ANSI. Made for you. - © 2025 The ANSI Blog - Our Privacy Policy - Our Cookie Policy - Our Terms of Use - Do Not Sell My Personal Information Copyright The ANSI Blog. All rights reserved.

  • Latest
  • ANSI Blog
  • ANAB Blog
  • Workcred Point of View
  • Customer Service
Search