After the CrowdStrike outage, CIOs are advised to diversify vendor ecosystems and implement robust software supply chain compliance measures. Maintaining the availability of BitLocker recovery keys, and conducting regular disaster recovery tests is crucial, says Vishal Grover, CIO, apexanalytix.
As economic pressures mount, CISOs face increasing demands to optimize their cybersecurity budgets while maintaining robust defenses. This webinar delves into strategies for maximizing security investments and the benefits of technology consolidation. Learn how to navigate budget scrutiny and leverage a unified...
Bradon Rogers, chief customer officer at Island, details how traditional browser frameworks amplify security risks. His approach challenges the status quo, suggesting that browsers can be more than just potential liabilities. They can be assets for enterprise environments.
Enterprises have deliberated on implementing zero trust for years, but vendors are overpromising and under-delivering on zero trust solutions. Gartner Vice President Analyst John Watts discusses the current adoption status and misunderstandings surrounding the framework.
Navigating the crowded GRC vendor market is complicated and time-consuming – there are lots of requirements to meet and lots of vendors to sort through. Consistently and efficiently evaluate your vendor shortlist across five categories and dozens of weightable features and capabilities with our GRC Buyer's Guide.
...
The guardrails organizations use to protect employee identities are often ineffective for contractors, business partners or vendors since they bring their own devices. Many businesses struggle to implement identity safeguards in a setting that's more heterogeneous and offers fewer controls.
Shields Health Care Group, a Massachusetts-based medical imaging services provider, is facing two class action lawsuits filed this week - a consolidated federal case and a similar, separate case filed in state court - both in the wake of the same 2022 data breach affecting 2 million individuals.
Many of the major health data breaches being reported to regulators reflect a variety of poor practices by business associates, including retaining sensitive patient information for much longer than necessary, says Kate Borten, president of The Marblehead Group.
From the cyberwar in Ukraine to ongoing ransomware threats and emerging global data regulations, 2022 has been a taxing year for CISOs. And they can expect more of the same in 2023, says Rodman Ramezanian of Skyhigh Security. He offers predictions and advice for the new year.
Four major cloud providers - AWS, Google, Microsoft and Oracle – will participate in a $9 billion U.S. Department of Defense remote computing contract, marking a departure from an earlier winner-take-all approach that ended up in court and slowed the DoD's cloud transformation program for years.
A server misconfiguration at Kentucky-based CorrectCare Integrated Health Inc., a firm that provides medical claims processing for correctional facilities, has exposed sensitive information of nearly 600,000 inmates who received medical care during the last decade while incarcerated.
Sonatype’s eighth annual State of the Software Supply Chain Report blends a broad set of public and proprietary data and analysis, including dependency update patterns for more than 131 billion Maven Central downloads and thousands of open source projects, survey results from 662 engineering professionals, and the...
From SolarWinds to Kaseya, Accellion, Log4j,
or Okta, third-party security breaches are
among the most devastating for organizations
affected.
Defense against third-party risk is
a top-tier risk register item, and it is not a one-off either – you need
continuous monitoring to evaluate the security stance of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.