Process mining offers great opportunity to fine-tune business processes but also introduces potential risks, which can be mitigated with strong governance measures.
Search Results: software supply chain (603)
Implementing a multi-cloud architecture across different geographies opens up unique security risks. Bill Doerrfeld recommends concrete measures to protect your business.
The shift to renewable energy leaves oil, gas, and electrical infrastructure vulnerable to threats such as ransomware, DDoS, and more, CISO Chris Hughes explains.
Kieron Allen and Chris Hughes discuss how our cybersecurity analysts determined which companies made the new Top 10 list of Cybersecurity Business Enablers.
The Top 10 providers model – a Cloud Wars staple – now includes the top four tech pillars: cloud, cybersecurity, AI/hyperautomation, and data.
In this CEO Outlook moment, Thomas Kurian explains why he thinks edge computing, cybersecurity, and the mainstreaming of AI will have the most impact this year.
Bob Evans has a wide-ranging conversation with Google Cloud CEO Thomas Kurian’s about how the company’s youthful mindset sets it apart from its competitors and where he sees technology going in the near future.
Google Cloud CEO Thomas Kurian discusses customer buying patterns and priorities, 2023 trends, and how a customer focus attracts great employees.
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
The capabilities of Snyk for automatic discovery & remediation have positioned it to shift security left. However, vendor solutions only go so far.
A sustainable future is not out of reach but depends on how we continue efforts to build resilient cybersecurity frameworks which support the critical infrastructures, IoT, and open-source solutions we all depend on.
Bill reviews ThreatQuotient’s “2022 State of Cybersecurity Automation” report, which finds that the majority of organizations experience pain problems implementing these initiatives.
Bill reconnects with Sonatype Co-founder Brian Fox to find out why it’s taken so long for organizations to respond to the Log4j vulnerability, which was first discovered a year ago.
The public sector has a reputation for moving slowly and inefficiently, but when it comes to cybersecurity, it may be the place for private sector businesses to watch and learn.
Bill summarizes the main points from Endor’s 2022 State of Dependency Management study to better understand how cybersecurity professionals should respond to OSS vulnerabilities.
Chris provides takeaways from the Cyber Safety Review Board’s recent Log4j incident report.
Bill Doerrfeld speaks with oak9 Co-founder Aakash Shah about ways to reduce known and unknown vulnerabilities brought on by open-source software.
There’s a big push for SBOMs (software bills of material) as it’s becoming clear how crucial they are to cybersecurity. Read our guidebook to learn everything about SBOMs, including what they are and why they’re necessary, and how they work.
Bill Doerrfeld revisits the past decade of rising software vulnerabilities, which reinforces the need to patch compromised servers, use active threat monitoring, and prepare for quick responses to future zero-day exploits.
Worker shortages are nothing new, but the methods by which organizations can retain and recruit has evolved, as these eight tips address the IT talent gap demonstrate.