Threat intelligence is only one piece of the puzzle when it comes to improving supply chain security. As part of protecting the supply chain and reducing third-party risk, here's how your organization should get started.
Armis research found that end users are not paying attention to the major cybersecurity attacks plaguing operational technology and critical infrastructure across the country, signaling the importance of businesses prioritizing a focus on security as employees return to the office.
Eclypsium has discovered four vulnerabilities that impact 128 Dell device models, and an estimated 30 million individual devices, that allow threat actors to remotely execute code in a pre-boot environment, according to new research released today.
Inon Shkedy, Head of Security Research for Traceable, who also serves as the API Security Project Lead at OWASP and has co-authored the OWASP API Top 10, talks to Security about API security risks.
Your employees are the key to smarter security. Learn how you can re-establish company security rules and build them into your culture so that every employee is invested.
Now is the time to take a step back and consider approaches that can help to re-brand the image of your corporate security and resilience departments. This article will share four direct strategies that can help you and your security team transition from being seen as a “cost center” to becoming a value-add to your business’s bottom line.
Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain. Kirsten Provence has led Boeing’s supply chain security program for nearly a decade; here she explains what has propelled efficiency gains by scaling the program using subsidiaries.
Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain. Kirsten Provence has led Boeing’s supply chain security program for nearly a decade; here she explains what has propelled efficiency gains by scaling the program using subsidiaries.
Enterprise security professionals face a difficult task. The growth of the cybersecurity market has led to increased clutter and overwhelming fragmentation. Before we dig into the tips that enterprise security professionals should keep top of mind when seeking out the right vendor, let’s delve into the primary pain points that buyers face.
As the centralized place for intelligence and information, the NFL’s GSOC played a pivotal role in the League’s pandemic response, streamlining access and infection control, updating business continuity plans, and providing relevant data to enable all stakeholders to make informed decisions.
As a centralized place for intelligence and information, the NFL’s GSOC, led by Director of Intelligence Operations Robert Gummer, played a pivotal role in the League’s pandemic response, streamlining access and infection control, updating business continuity plans, and providing relevant data to enable all stakeholders to make informed decisions.