newsSEC notice to SolarWinds CISO and CFO roils cybersecurity industryUS SEC staff have recommended legal action against individual SolarWinds employees, including the CISO — an unusual move that is causing a stir among cybersecurity professionals.By Apurva Venkat27 Jun 20235 minsCSO and CISOData BreachLegal news analysis Fileless attacks surge as cybercriminals evade cloud security defensesBy Michael Hill27 Jun 20235 minsCyberattacksSupply ChainApplication Securityfeature 5 best practices to ensure the security of third-party APIsBy Linda Rosencrance15 Jun 20238 minsSupply ChainSupply ChainSupply Chain newsRezilion releases agentless runtime software vulnerability management solutionBy Michael Hill 14 Jun 20233 minsThreat and Vulnerability ManagementSupply ChainApplication Security feature10 security tool categories needed to shore up software supply chain securityBy Ericka Chickowski 07 Jun 202312 minsSecurity SoftwareSupply Chain featureFormer Uber CSO Joe Sullivan and lessons learned from the infamous 2016 Uber breachBy Deb Radcliff 24 May 202312 minsCSO and CISOData BreachLegal news analysisLegitimate looking npm packages found hosting TurkoRat infostealerBy Lucian Constantin 19 May 20235 minsMalwareSupply ChainApplication Security newsRussian national indicted for ransomware attacks against the USBy Apurva Venkat 18 May 20234 minsRansomwareLegalCybercrime newsArnica's real-time, code-risk scanning tools aim to secure supply chainBy Shweta Sharma 16 May 20234 minsDevSecOpsSupply ChainSoftware Development ArticlesfeatureThe BISO: bringing security to business and business to securityEven the most tech-savvy leaders can use an effective liaison between corporate and cybersecurity—the business information security officer (BISO) bridges communications gaps and acts as a security evangelist and gatekeeper.By Deb Radcliff 05 Jan 2023 7 minsC-SuiteBusiness IT AlignmentData and Information SecurityfeatureHow acceptable is your acceptable use policy?If users resent, fear, or ignore policies around the use of corporate resources, it may be time for a different approach that incentivizes rather than punishes.By Vawn Himmelsbach 14 Dec 2022 8 minsCSO and CISOAccess ControlBusiness IT Alignmentfeature8 things to consider amid cybersecurity vendor layoffsCybersecurity vendor layoffs raise several issues for CISOs and customers, not the least of which are security- and risk-related factors. Here are 8 things to consider if your security vendor has announced significant staff cuts.By Michael Hill 01 Dec 2022 12 minsBusiness OperationsVendors and ProvidersopinionCISOs: Do you know what’s in your company's products?CISOs need to take a more direct role in the operations side of the business to help build security in by design.By Christopher Burgess 05 Aug 2021 4 minsCSO and CISOBusiness OperationsSecurityhow-toTabletop exercise scenarios: 3 real-world examplesPlus, start your journey with 10 pro tips for running a successful tabletop exercise.By Josh Fruhlinger and Sarah D. Scalet 30 Jun 2021 15 minsRansomwarePhishingDisaster Recovery View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Data Protection in a Multicloud World By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management View all Explore a topic Application Security Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime