Why security leaders need to include financial health when assessing security...
How do you handle third party risk assessments? Assessing the risk of vendors and partners is not new. Some organizations have entire teams dedicated to the process. We have a variety of models and...
View ArticleHow secure is your supply chain?
Today’s global supply chains carry risks that run the gamut from pirates off the coast of East Africa to bad guys tampering with goods in transit. And international supply chains also put companies at...
View ArticleNo, Netflix is not a victim of Ransomware
A security firm has claimed the recent issues facing Netflix and their series "Orange is the New Black" are Ransomware, and a recent report from NBC News states the same. While no company wants to be...
View ArticleIDG Contributor Network: Researchers and defenders needed in IIoT
The Internet of Things and Industrial IoT are causing a lot of security headaches, mostly because these devices and the solutions used to secure them are still in the nascent stages of being developed...
View ArticleHackers, hackers everywhere in Ljubljana
So, that’s a wrap. What a great couple days it has been here in Ljubljana, Slovenia. Not sure where that is? Well, Google Maps can sort that our for you. I remember a few months back that it was...
View ArticleIDG Contributor Network: Cyber incident response: Who does what?
“Who in the government will help me if we face a significant cyber incident?” It’s a question I get asked all the time, and until recently, there hasn’t been a clear answer. That changed last month,...
View ArticleIoT and your digital supply chain
“Money, it's a gas. Grab that cash with both hands and make a stash”, Pink Floyd is always near and dear to my heart. No doubt the theme song to a lot of producers of devices that fall into the...
View ArticleA better way for security leaders to handle third party risk
How many partners are in your supply chain? What about your digital supply chain?More importantly, how confident are you in their practices and ability to protect the information and reputation of...
View ArticleIDG Contributor Network: Technology levels the vendor playing field
Since the early days of my career, I’ve heard everyone from system administrators to CIOs say, “Nobody’s ever been fired for buying IBM.” Certainly, back in the height of the mainframe era, IBM was...
View ArticleWhy security leaders need to include financial health when assessing security...
How do you handle third party risk assessments? Assessing the risk of vendors and partners is not new. Some organizations have entire teams dedicated to the process. We have a variety of models and...
View ArticleHow secure is your supply chain?
Today’s global supply chains carry risks that run the gamut from pirates off the coast of East Africa to bad guys tampering with goods in transit. And international supply chains also put companies at...
View ArticleNo, Netflix is not a victim of Ransomware
A security firm has claimed the recent issues facing Netflix and their series "Orange is the New Black" are Ransomware, and a recent report from NBC News states the same. While no company wants to be...
View ArticleResearchers and defenders needed in IIoT
The Internet of Things and Industrial IoT are causing a lot of security headaches, mostly because these devices and the solutions used to secure them are still in the nascent stages of being developed...
View ArticleKaspersky discovers supply-chain attack at NetSarang
While investigating suspicious DNS requests for a financial institution, researchers at Kaspersky discovered backdoor in recently updated copies of software released by NetSarang, a developer of...
View ArticleIDG Contributor Network: Software supply chain puts businesses at risk
What a time to be in cyber security! The high-profile breaches just keep rolling in - Equifax, SEC, Deloitte. It’s the new normal. Are we becoming desensitized to it all? Every breach seems to follow...
View ArticleIDG Contributor Network: DOD releases new guidance to protect data within the...
The U.S .Department of Defense issued new guidance on how it might penalize business partners that do not adequately adhere to new security rules codified in NIST SP 800-171.NIST has prescribed a set...
View ArticleIDG Contributor Network: DOD releases new guidance to protect data within the...
The U.S .Department of Defense issued new guidance on how it might penalize business partners that do not adequately adhere to new security rules codified in NIST SP 800-171.NIST has prescribed a set...
View ArticleIDG Contributor Network: What can we learn about infosec from the Varsity...
There is tremendous pressure with successful parents to get their kids into top colleges. Graduation from a top school doesn’t just bring with it the prestige of its diploma, it’s also the connections...
View Article
More Pages to Explore .....