Quantcast
Channel: CSO Online Supply Chain Management
Browsing all 58 articles
Browse latest View live

Why security leaders need to include financial health when assessing security...

How do you handle third party risk assessments? Assessing the risk of vendors and partners is not new. Some organizations have entire teams dedicated to the process. We have a variety of models and...

View Article



How secure is your supply chain?

Today’s global supply chains carry risks that run the gamut from pirates off the coast of East Africa to bad guys tampering with goods in transit. And international supply chains also put companies at...

View Article

No, Netflix is not a victim of Ransomware

A security firm has claimed the recent issues facing Netflix and their series "Orange is the New Black" are Ransomware, and a recent report from NBC News states the same. While no company wants to be...

View Article

IDG Contributor Network: Researchers and defenders needed in IIoT

The Internet of Things and Industrial IoT are causing a lot of security headaches, mostly because these devices and the solutions used to secure them are still in the nascent stages of being developed...

View Article

Hackers, hackers everywhere in Ljubljana

So, that’s a wrap. What a great couple days it has been here in Ljubljana, Slovenia. Not sure where that is? Well, Google Maps can sort that our for you. I remember a few months back that it was...

View Article


IDG Contributor Network: Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?” It’s a question I get asked all the time, and until recently, there hasn’t been a clear answer. That changed last month,...

View Article

IoT and your digital supply chain

“Money, it's a gas. Grab that cash with both hands and make a stash”, Pink Floyd is always near and dear to my heart. No doubt the theme song to a lot of producers of devices that fall into the...

View Article

A better way for security leaders to handle third party risk

How many partners are in your supply chain? What about your digital supply chain?More importantly, how confident are you in their practices and ability to protect the information and reputation of...

View Article


IDG Contributor Network: Technology levels the vendor playing field

Since the early days of my career, I’ve heard everyone from system administrators to CIOs say, “Nobody’s ever been fired for buying IBM.” Certainly, back in the height of the mainframe era, IBM was...

View Article


Why security leaders need to include financial health when assessing security...

How do you handle third party risk assessments? Assessing the risk of vendors and partners is not new. Some organizations have entire teams dedicated to the process. We have a variety of models and...

View Article

How secure is your supply chain?

Today’s global supply chains carry risks that run the gamut from pirates off the coast of East Africa to bad guys tampering with goods in transit. And international supply chains also put companies at...

View Article

No, Netflix is not a victim of Ransomware

A security firm has claimed the recent issues facing Netflix and their series "Orange is the New Black" are Ransomware, and a recent report from NBC News states the same. While no company wants to be...

View Article

Researchers and defenders needed in IIoT

The Internet of Things and Industrial IoT are causing a lot of security headaches, mostly because these devices and the solutions used to secure them are still in the nascent stages of being developed...

View Article


Kaspersky discovers supply-chain attack at NetSarang

While investigating suspicious DNS requests for a financial institution, researchers at Kaspersky discovered backdoor in recently updated copies of software released by NetSarang, a developer of...

View Article

IDG Contributor Network: Software supply chain puts businesses at risk

What a time to be in cyber security! The high-profile breaches just keep rolling in - Equifax, SEC, Deloitte. It’s the new normal. Are we becoming desensitized to it all? Every breach seems to follow...

View Article


IDG Contributor Network: DOD releases new guidance to protect data within the...

The U.S .Department of Defense issued new guidance on how it might penalize business partners that do not adequately adhere to new security rules codified in NIST SP 800-171.NIST has prescribed a set...

View Article

IDG Contributor Network: DOD releases new guidance to protect data within the...

The U.S .Department of Defense issued new guidance on how it might penalize business partners that do not adequately adhere to new security rules codified in NIST SP 800-171.NIST has prescribed a set...

View Article


IDG Contributor Network: What can we learn about infosec from the Varsity...

There is tremendous pressure with successful parents to get their kids into top colleges. Graduation from a top school doesn’t just bring with it the prestige of its diploma, it’s also the connections...

View Article
Browsing all 58 articles
Browse latest View live




Latest Images