newsSEC notice to SolarWinds CISO and CFO roils cybersecurity industryUS SEC staff have recommended legal action against individual SolarWinds employees, including the CISO — an unusual move that is causing a stir among cybersecurity professionals.By Apurva Venkat27 Jun 20235 minsCSO and CISOData BreachLegal news analysis Fileless attacks surge as cybercriminals evade cloud security defensesBy Michael Hill27 Jun 20235 minsCyberattacksSupply ChainApplication Securitynews UK NCSC urges legal firms to strengthen cyber defencesBy Michael Hill22 Jun 20236 minsThreat and Vulnerability ManagementLegal feature5 best practices to ensure the security of third-party APIsBy Linda Rosencrance 15 Jun 20238 minsSupply ChainSupply ChainSupply Chain newsRezilion releases agentless runtime software vulnerability management solutionBy Michael Hill 14 Jun 20233 minsThreat and Vulnerability ManagementSupply ChainApplication Security feature10 security tool categories needed to shore up software supply chain securityBy Ericka Chickowski 07 Jun 202312 minsSecurity SoftwareSupply Chain newsUK NCSC releases new training packages to help businesses manage supply chain risksBy Michael Hill 25 May 20232 minsRisk ManagementSupply Chain featureFormer Uber CSO Joe Sullivan and lessons learned from the infamous 2016 Uber breachBy Deb Radcliff 24 May 202312 minsCSO and CISOData BreachLegal news analysisLegitimate looking npm packages found hosting TurkoRat infostealerBy Lucian Constantin 19 May 20235 minsMalwareSupply ChainApplication Security ArticlesfeatureThe BISO: bringing security to business and business to securityEven the most tech-savvy leaders can use an effective liaison between corporate and cybersecurity—the business information security officer (BISO) bridges communications gaps and acts as a security evangelist and gatekeeper.By Deb Radcliff 05 Jan 2023 7 minsC-SuiteBusiness IT AlignmentData and Information SecurityfeatureHow acceptable is your acceptable use policy?If users resent, fear, or ignore policies around the use of corporate resources, it may be time for a different approach that incentivizes rather than punishes.By Vawn Himmelsbach 14 Dec 2022 8 minsCSO and CISOAccess ControlBusiness IT Alignmentfeature8 things to consider amid cybersecurity vendor layoffsCybersecurity vendor layoffs raise several issues for CISOs and customers, not the least of which are security- and risk-related factors. Here are 8 things to consider if your security vendor has announced significant staff cuts.By Michael Hill 01 Dec 2022 12 minsBusiness OperationsVendors and ProvidersopinionCISOs: Do you know what’s in your company's products?CISOs need to take a more direct role in the operations side of the business to help build security in by design.By Christopher Burgess 05 Aug 2021 4 minsCSO and CISOBusiness OperationsSecurityhow-toTabletop exercise scenarios: 3 real-world examplesPlus, start your journey with 10 pro tips for running a successful tabletop exercise.By Josh Fruhlinger and Sarah D. Scalet 30 Jun 2021 15 minsRansomwarePhishingDisaster Recovery View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Explore a topic Application Security Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime