Business Operations | News, how-tos, features, reviews, and videos
Horrible bosses are everywhere but cybersecurity appears to be particularly problematic, leading to talent-retention issues and security risks. Here’s how not to be a toxic CISO.
Your company's intellectual property—whether that's patents, trade secrets or just employee know-how—may be more valuable than your physical assets. Here's to establish basic policies and procedures for IP protection.
Joining organizations that promote diversity in cybersecurity can offer connections with like-minded professionals and help create a more inclusive and equitable industry.
There’s an imbalance between those at the top and the next generation of cyber talent, but recognizing and embracing a more diverse workforce can pay dividends, experts say.
Every organization should run tabletop exercises that answer key questions about their preparedness for ransomware and DDoS attacks, third-party risks, and insider threats.
Still a minority in the profession, female cybersecurity professionals can expand their career development and get support from their peers by joining women-only groups.
Software suppliers and consumers alike will increasingly need to be familiar with global requirements and regulations designed to mitigate software supply chain attacks.
The push to create more detailed, reliable, and mature BOMs with sufficient detail and depth to counter supply chain attacks continues to advance with the latest OWASP model.
Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.
Key recommendations from the NIST’s latest guidance and why they are relevant to modern organizations developing and delivering software.