How to Interpret New White House Software Supply Chain Security Guidance

In September, the United States Office of Management and Budget (OMB) issued a memorandum directing federal agencies to comply with the NIST guidance that resulted from Executive Order (EO) ...
November 29, 2022

Assessing Business Risks Associated With Change

Change is a necessary and inevitable part of business, whether it relates to new technology, the socio-economic climate, the competitive landscape, or the regulatory environment. That also i ...
November 9, 2022

Internal Controls to Implement for Data Privacy

Thanks to the endless parade of data breaches that fill news headlines, discussions about data privacy have become commonplace in the corporate world. That's good news; corporate organizatio ...
November 9, 2022

Signs You May Be Vulnerable to Supply Chain Attacks

One of the most notorious cybersecurity attacks to strike through the corporate supply chain happened in 2020. That's when criminals successfully installed malware into the Orion software pr ...
November 9, 2022

Consumer Data Privacy and Future Readiness: Developing a Meaningful Growth Outlook

To get a sense of how consumers feel about the privacy of their personal data, a McKinsey survey from 2020 offers some telling insights: Recent high-profile consumer-data breaches have ...
November 9, 2022

Most Common Types of Cybersecurity Vulnerabilities

In 2021, Microsoft patched the Windows Print Spooler remote code execution vulnerability, a weakness in the Microsoft operating system that allowed attackers to execute code with administrat ...
November 9, 2022
1 2 3 35