Supply Chain Management Software

Supply Chain Management Software | News, how-tos, features, reviews, and videos

graduate school college certification mortar board valedictorian cole keister via unsplash
supply chain

human weak link cybersecurity primary

Software supply chain puts businesses at risk

The new reality in 2017: High-profile breaches, including Equifax, SEC, Deloitte... In this article, former research director at Gartner and current VP at DFLabs, Oliver Rochford uses the CCleaner Breach to explain the unique...

Malware virus

Kaspersky discovers supply-chain attack at NetSarang

While investigating suspicious DNS requests for a financial institution, researchers at Kaspersky discovered backdoor in recently updated copies of software released by NetSarang, a developer of management tools for servers and...

industrial refinery energy plant oil gas

Researchers and defenders needed in IIoT

Strategies to overcome the complexity of patching vulnerabilities in critical infrastructure

netflix

No, Netflix is not a victim of Ransomware

A security firm has claimed the recent issues facing Netflix and their series "Orange is the New Black" are Ransomware, and a recent report from NBC News states the same. While no company wants to be held under the threat of ransom...

pulling companies apart chain broken

How secure is your supply chain?

If you're like many organizations, your security focus is on protecting email, financial data and customer data. What if your greatest threats come from your vendors and supply chain?

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

financial health

Why security leaders need to include financial health when assessing security risk

James Gellert explains the importance of financial health and what to look for when assessing third parties and partners

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

supply chain

Technology levels the vendor playing field

Gone are the days when the largest vendor in their space was the "right" choice when procuring software. It's time for that viewpoint to change, as the modern age of technology has opened up a world of options for organizations to...

risk complexity tightrope

A better way for security leaders to handle third party risk

Patrick Gorman shares the change in mindset needed to improve how we handle and protect the digital supply chain, third-party risk, and security overall

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

The Gold Rush

IoT and your digital supply chain

“Money, it's a gas. Grab that cash with both hands and make a stash”, Pink Floyd is always near and dear to my heart. No doubt the theme song to a lot of producers of devices that fall into the category of Internet of Things or...

security group team circuitry

Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?”

The CSO identity management survival guide

This guide will help you communicate through the challenges of identity management, learn from success stories and discover the most valuable features of today's identity management tools.

Load More
You Might Also Like