Australia's pandemic contact-tracing app may be released by the end of the month. The app will collect names and phone numbers, enabling health authorities to contact those who've been exposed to people who have been infected with COVID-19.
As healthcare organizations navigate the COVID-19 crisis, they should take critical steps to improve their security posture and third-party security risk governance, says consultant Brenda Ferraro, the former CISO at Meritain Health, an Aetna subsidiary.
Digital transformation is creating increasingly complex ecosystems for companies that use third parties to augment their own digital and business capabilities. Because of the increasingly digital nature of third-party ecosystems, security and risk management leaders and teams must work together to manage third-party...
The stuck-at-home chronicles have fast become surreal, as remote workers face down a killer virus on the one hand and the flattening of their work and personal lives on the other. To help, many have rushed to adopt Zoom. And for many use cases - hint: not national security - it is a perfectly fine option.
Organisations need to think carefully about a future that relies on getting by with existing resources versus outsourcing some or all of their security operations to a trusted advisor. There's never been a more important time to make that decision.
Download this guide on addressing the cyber skills shortage and...
At its core, cybersecurity is about applying scarce resources to the highest risk. And nothing quite puts that tenet to the test like the COVID-19 pandemic. Jim Routh, CISO of MassMutual, discusses the challenges of managing a remote workforce and third-party relationships during this crisis.
An emerging technology, Vvendor Privileged Access Management (VPAM) can provide both operational efficiencies and increased security in your projected ROI analysis. And that is a rare combination in InfoSec these days.
As automobile manufacturers and others rush to shift to production of ventilators and other medical equipment and supplies to help fight the COVID-19 pandemic, they must take steps to ensure security, privacy and safety risks are addressed, says technology attorney Steven Teppler.
Traditionally, security teams look to penetration tests and red teaming to test and build confidence in their security programs. These options are often costly, time-consuming, and limited in scope. There is a better way to gain confidence in security models: continuous attack simulations, which automate adversary...
2019 was the year when enterprises across all sectors woke up to the scale of their third-party risk challenges. How will they respond to those risks in 2020? Jaymin Desai of OneTrust shares insights.
Today's organizations are increasingly using multi-cloud environments, exacerbating third-party risk, says Frank Price of CyberGRX, who provides risk management insights.
While conventional approaches to third-party risk management remain unchanged, the industry is transitioning to a new "normal," says RiskRecon CEO Kelly White.
Want to maximize your digital transformation project success and impact? Start by ensuring that you correctly explain risk to stakeholders, as well as continually benchmark your organization's risk management maturity, says ServiceNow's Barbara Kay.
In a joint interview at the RSA 2020 conference, Edna Conway of Microsoft and Wendy Nather of Cisco discuss how to apply "zero trust" to supply chain security.
Percona is an industry leader in providing best-of-breed enterprise-grade support, consulting, managed services, training and software for MySQL, MariaDB, MongoDB, PostgreSQL and other open source databases in on-premises and cloud environments. After noticing gaps across their third-party security and privacy...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.