Cybersecurity

Responsible InfoSec is the Hot New Purpose

Posted: 05/05/2021 - 09:00
Responsible InfoSec is the Hot New Purpose

Digital transformation is the phrase on everyones lips – for good reason. It enables organizations to better manage operations, enhance profit margins, and ensure the efficient transfer of goods and information between supply chain nodes. As a procurement professional, youre on the front line of this process. This is also why you need to be the first line of defense.

Detecting the SolarWinds Hack

Posted: 02/25/2021 - 09:00
Prominent cybersecurity firms such as Microsoft and FireEye were victims of the SolarWinds attack and also the first to identify it.

Detecting the SolarWinds Hack

The cybersecurity world has been overtaken with concern over a state-sponsored cyberattack perpetrated by Russian intelligence agents against multiple federal agencies, including those responsible for our nuclear stockpile. Prominent cybersecurity firms such as Microsoft and FireEye, who were also victims of the attack, were the first to identify it. 

There’s Plenty of Room at the Table for Nearshore and H-1B Visa Holders

Posted: 10/12/2020 - 09:45
Nearshoring, however, provides the innovation, skillset and diversity to keep tech innovation moving forward with or without visa restrictions.

In June 2020, in response to the coronavirus, President Trump signed an executive order to freeze access to new H-1B visas for professional and technology workers doing business in the U.S. This has a huge impact, considering in 2019 about 139,000 new H-1B petitions were approved, joining 250,00 which were extended.

What Is ISO 27001? Everything You Need to Know

Posted: 09/25/2020 - 20:52
The ISO 27001 standard is meant to prevent cyber threats from becoming security incidents.

Data security is a significant issue of concern for both small and large organizations. As an organization holds onto data collected from customers and vendors, it should be wary of the threat posed by cybercriminals. There are several standards that you should comply with when it comes to information security. ISO 27001 is one such standard.

How Quantum Computers Will Change Our World

Posted: 06/12/2020 - 22:14
Quantum Computers

There’s something that has been revolutionizing our world without us even noticing it. A technological device that promises to create a new way to encrypt information and process data. This technology is called quantum computing. This isn’t something easy to understand at first, but once we know the science behind it, we’ll be able to see the benefits this could bring to our society. 

Securing Remote Workforces, Payments and Customer Data in a Rapidly Evolving World

Posted: 06/12/2020 - 00:01
Securing Remote Workforces for compliance

While the rapid shift to a remote workforce model in the wake of the COVID-19 pandemic has driven many changes for businesses around the world, a few constants have grown in importance. To maintain operations as seamlessly as possible, organizations must secure their payment systems, technology access, and sensitive customer data no matter where it resides, and that is particularly true when it is being accessed or processed by employees from their homes.

The Cyber Skills Gap isn’t Going Anywhere and Businesses Need to Adapt

Posted: 04/27/2020 - 21:08
Cybersecurity Talent

The constant cyber threat has completely changed the way boards around the world approach risk. A robust cybersecurity posture is no longer a “nice-to-have” but a business priority, especially at a time of almost pervasive threats. As the need to protect customer data grows, business leaders have been attempting to work out how best to respond to this new reality, and, most importantly, whose responsibility it should be.

Understanding the Data Security, Compliance and Customer Experience Trends Shaping Your Business in 2020

Posted: 03/02/2020 - 05:45
Understanding the Data Security, Compliance and Customer Experience Trends Shaping Your Business in 2020

As businesses across all industries undergo digital transformation and adopt new, omnichannel strategies for engaging with customers, the enterprise contact center of today is continuously evolving and looks dramatically different than in the past.

Three Supplier Conversations You Need to Have Now

Posted: 01/22/2020 - 00:00
Your suppliers’ threat profiles will inevitably add to your business’ cybersecurity risk.

Suppliers are mission-critical partners for business success. Unfortunately, too often, an “arm’s length” relationship creates problems that are revealed only after it’s too late.

When suppliers feel conversations only occur after poor performances, the opportunity to have a productive, collaborative conversation may already be over.

Procurement Risk – Limited Visibility of the Supply Chain

Posted: 10/04/2019 - 23:44
A few weeks ago, I reviewed the 2018 Deloitte Global Chief Procurement Officer Survey and was not surprised that cost reduction, new products/market development and managing risks remain the top three business strategies for procurement. Sixty-five percent (65%) of procurement leaders report having limited or no visibility beyond their Tier 1 suppliers.

Infosecurity Europe 2019

Posted: 05/31/2019 - 20:46
Infosecurity Europe, Europe's largest information security event, will open its doors from Tuesday 4th to Thursday 6th June 2019 at Olympia, Hammersmith in London, bringing together business, technology and cyber communities to discuss and discover the best way to protect organisations and individuals.
 

Pages

Subscribe to RSS - Cybersecurity