Business Operations

Business Operations | News, how-tos, features, reviews, and videos

Binary chain links of data  >  Blockchain / blockchain security / linked elements
manager scanning workforce data via antimalware picture id1022805724

Lady Justice statue with scales, law books. [regulation / compliance / legal liability / fairness]

New York-barred attorneys required to complete cybersecurity, privacy, and data protection training

New requirements highlight lawyers’ technical competence duty to meet professional, ethical, and contractual obligations to safeguard client information.

Mondelez and Zurich’s NotPetya cyber-attack insurance settlement leaves behind no legal precedent

Mondelez International and Zurich American Insurance settled a keenly watched lawsuit over how cyberattack insurance applies to intrusions from nation states during wartime. A private agreement, its resolution sheds no light on how...

teamwork / developers / programmers / collaboration / conversation, discussion, gesturing

Enterprises embrace devsecops practices against supply chain attacks

Healthy developer-team culture and adherence to devsecops best practices to protect against supply chain attacks are surprisingly commonplace in today’s security environment, according to a report from Google Cloud's DORA research...

prisoner jail crime

Former Broadcom engineer gets eight months in prison for trade secrets theft

Peter Kisang Kim admitted to stealing Broadcom data related to its Trident family of network switching and cloud networking chipsets, while working for a Chinese startup.

supply chain / virtual network of connections

Global companies say supply chain partners expose them to ransomware

A Trend Micro report reveals that 52% of global organizations have a supply chain partner that was hit by ransomware.

instagram app login

Instagram faces $402 million fine for alleged mishandling of children’s data

Parent company Meta said that it plans to appeal the decision by the Irish Data Protection Commissioner, which is the second-largest, privacy-based fine on record.

Cover image for how much data does facebook use article

Facebook agrees to settle class action lawsuit related to Cambridge Analytica data breach

The four-year-old lawsuit claimed Facebook allowed the British political consulting firm access to private data of over 80 million users.

A binary map of china.

3 ways China's access to TikTok data is a security risk

The security community weighs in on real-world scenarios in which China or other nations could operationalize data collected by online platforms and how to mitigate the risk.

supply chain management logistics - ERP - Enterprise Resource Planning

How Australia and New Zealand CISOs can get ahead of supply chain attacks

With threats on the rise, Australia and New Zealand CISOs are facing the challenge that an attack on one organisation can become a common vulnerability.

programmer certification skills developer devops data scientist laptop by brayden george unsplash

Breaking down CIS's new software supply chain security guidance

The Center for Internet Security offers best practices for securing each phase of the software supply chain.

assembly / architecture / modular structure / components

What is an SBOM? Software bill of materials explained

An SBOM is a detailed guide to what's inside your software. It helps vendors and buyers alike keep track of software components for better software supply chain security.

The shadow of hand unsettlingly hovers over a keyboard.

China's cyber espionage focus: intellectual property theft

The recently uncovered Operation CuckooBees campaign shows how serious China is about using IP theft as a competitive advantage. Protect IP now or chase it later.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

GitHub to mandate 2FA for all code contributors by 2023

The world’s largest development platform will require all code-contributing users to enroll in two-factor authentication by the end of 2023 to enhance software supply chain security.

CSO: Have you met these hackers? [slide 04]

Chinese APT group Winnti stole trade secrets in years-long undetected campaign

The Operation CuckooBees campaign used zero-day exploits to compromise networks and leveraged Windows' Common Log File System to avoid detection.

lawsuit judge law court decision sued

Cybersecurity litigation risks: 4 top concerns for CISOs

Cybersecurity and data protection are expected to become top drivers of legal disputes. What litigation risks should CISOs be most concerned about and what can they do about it?

A man casts the shadow of an ominous hooded figure against a circuit-based wall.

JHL Biotech's theft of Genentech data holds lessons for infosec

Genentech employees stole the company's data on behalf of JHL Biotech for years. What could they have done to spot the theft sooner?

rules rulebook law compliance regulation by baloon111 getty

New insider threat: Bad business decisions that put IP at risk

The U.S. FTC forced Weight Watchers to destroy algorithms after it violated privacy laws, giving CISOs another worry over protecting intellectual property.

data protection / security / risk management / data privacy / GDPR

Exiger launches data-agnostic supply chain risk platform

With supply chain risks abounding, extra visibility into potential problems could stand manufacturers in good stead.

Load More
You Might Also Like