Security professionals can use these four strategies to better protect themselves against third-party risk, which can lead to cyberattacks and data breaches.
Rohinee Mohindroo brings cybersecurity experience to the Chief Information Officer (CIO) position at Sitecore from her roles at three other firms, where she helped design cyber strategies to best defend against threats.
Where does the responsibility for code vulnerabilities lie, and how can cybersecurity leaders address these vulnerabilities? Find tools for determining the security of code and mitigating cyber risk in your organization.
By focusing on the three V’s — volume, velocity and visibility — of Software as a Service (SaaS) security, organizations can streamline and improve their security team’s efficiency, reducing their workload and increasing protection for the company against any potential exposure or data breach.
The new bill, the DHS Software Supply Chain Risk Management Act of 2021 (H.R. 4611), will secure the supply chains involved in Department of Homeland Security software contracts by requiring a new certification.
On-premises infrastructure has long been considered safer and more securable than its cloud counterpart. An increase in cyberattacks on on-premises systems is challenging this surety.
Instead of disrupting development with gates, organizations can implement a security champions program to build security guardrails into development. Here are five considerations for implementing an effective security champions program.