Business Operations | News, how-tos, features, reviews, and videos
The manufacturing sector remains a prominent target for cybercriminals, due to complex supply chains, legacy industry control and IoT systems, and a lack of appetite for downtime.
A classified briefing has revealed a sweeping espionage campaign stealing call data, sparking calls for action against Chinese cyber activities.
Blue Yonder, a supply chain software provider for Starbucks and other retailers, confirmed service disruptions caused by a ransomware attack.
Many companies have yet to embrace the role of CISO, but with the ever-expanding threat landscape there are growing reasons to consider adding the ultimate cyber boss to the management mix.
Arrest of 41 suspects more important than takedown of 22,000 malicious IP addresses, he argues.
Most organizations are still immature when it comes to identifying open-source dependencies that can usher in a host of problems when dealing with vulnerabilities.
After CrowdStrike’s software glitch caused massive cancellations and delays in air traffic worldwide, the US airline is now going to court.
The constant pressure of the CISO role can lead to burnout and in some cases drinking or drug abuse, compounding isolation and stress. Some are speaking out and calling for change.
The Cybersecurity Maturity Model Certification (CMMC) is a US Department of Defense program outlining tough requirements for Defense Industrial Base contractors to ensure the protection of sensitive data. It is expected to take effect by year-end.
To partially close the loop on the fallout from three major data breaches between 2014 and 2020 impacting more than 344 million customers, Marriott has settled both with the Federal Trade Commission and almost every American state. But the terms of t