Many businesses assume that vendors manage their own security. That’s not always the case, and it can leave them vulnerable to attacks. In fact, “98% of organizations have a relationship with a third ...
This edited extract is from How to Use Customer Data by Sachiko Scheuing ©2024 and reproduced with permission from Kogan Page Ltd. I have an extremely confidential piece of information on a particular ...
The FDA released their updated guidance on Cybersecurity in medical devices: Quality System Considerations and content for Premarket submissions at the end of June in 2025. In this guidance the FDA ...
Security managers are constantly being asked about the biggest cyber risks at present. But how big is the actual risk within the company? CISOs should be able to answer this question.
Cyber security risk assessment and management is a multidisciplinary field that combines elements of computer science, operational research and strategic decision-making to evaluate, mitigate and ...
In the digital age, customer data is a precious resource. Consumers and brands both know this. It’s the key to enabling everything from the personalized experiences customers demand to the optimized ...
Here's advice on avoiding breakdowns or inadequacies in a US financial institution's security and privacy policies and procedures that can trigger a matter requiring attention notice. CISOs who work ...
The U.S. Army Corps of Engineers Deployable Tactical Operating System (DTOS) communications units or Engineer Command and Control Vehicle from the U.S. Army Corps of Engineers Mobile District ECCV7 ...
Your risk and compliance functions are probably costing you more than they should. Not just in budget, but in drag. When your functions are siloed, they create redundant work, blind spots and a bad ...
As organizations continue to build out their security infrastructure, it becomes difficult to know whether they’re getting good value, and more important, whether they’re leaving holes in their ...