This edited extract is from How to Use Customer Data by Sachiko Scheuing ©2024 and reproduced with permission from Kogan Page Ltd. I have an extremely confidential piece of information on a particular ...
As organizations continually increase their dependence on information technology (IT) systems to conduct business, mitigating IT risk has become a top priority. But effectively managing IT risk is no ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
Today’s chief information security officers (CISOs) have a much different role to play than their predecessors. Modern CISOs—no longer just gatekeepers of firewalls and threat feeds—are expected to ...
Aligning an organization’s appetite for risk with cybersecurity strategies is a critical challenge CISOs face, one that requires balancing technical controls and business needs. Achieving that balance ...
For global enterprise businesses, it has become clear over time that the needs of staff and employees deployed around the world extend beyond physical and cybersecurity. In his nearly four decades as ...
Many businesses assume that vendors manage their own security. That’s not always the case, and it can leave them vulnerable to attacks. In fact, “98% of organizations have a relationship with a third ...
The healthcare sector is the most vulnerable to data breaches compared to other industries, where protected health information (PHI) breaches cost millions and disrupt critical clinical operations. In ...
SecurityScorecard today released new cybersecurity research on 250 leading global aerospace & aviation companies, including 100 top commercial passenger airlines. In The Cyber Risk Landscape of the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results