Business Operations | News, how-tos, features, reviews, and videos
Cloud supply chain security can be managed with a four-step strategic approach, learn more here.
The security community weighs in on real-world scenarios in which China or other nations could operationalize data collected by online platforms and how to mitigate the risk.
With threats on the rise, Australia and New Zealand CISOs are facing the challenge that an attack on one organisation can become a common vulnerability.
The Center for Internet Security offers best practices for securing each phase of the software supply chain.
An SBOM is a detailed guide to what's inside your software. It helps vendors and buyers alike keep track of software components for better software supply chain security.
The recently uncovered Operation CuckooBees campaign shows how serious China is about using IP theft as a competitive advantage. Protect IP now or chase it later.
The world’s largest development platform will require all code-contributing users to enroll in two-factor authentication by the end of 2023 to enhance software supply chain security.
The Operation CuckooBees campaign used zero-day exploits to compromise networks and leveraged Windows' Common Log File System to avoid detection.
Cybersecurity and data protection are expected to become top drivers of legal disputes. What litigation risks should CISOs be most concerned about and what can they do about it?
Genentech employees stole the company's data on behalf of JHL Biotech for years. What could they have done to spot the theft sooner?