cyberattacks

Now that President Donald J Trump has been sworn in, it is time to clear the air concerning Russia. It will take an effort
If you're like most Americans, the idea that our country doesn't have a unified cyber defense agency is about as unthinkable as a presidential contest between Donald Trump and Hillary Clinton.
As more organizations here in North America and overseas increasingly utilize third party vendors with a global presence to perform critical functions, process key transactions and provide exposure to sensitive proprietary information, those organizations with mature third party risk (TPR) programs are receiving a loud call to provide assistance to those new to the TPR field.
The concept of a supply chain as it is now understood borrows heavily from military strategy, where those armies that could assure the supply of critical materiel when it was needed won wars and spared lives.
1. Most notably: Third Party Relationships: Risk Management Guidance. Bulletin OCC-2013-29. Office of the Comptroller of
Yet another massive data break example, the TalkTalk data breach of "significant and sustained proportions" as quoted from the CEO Chief Executive Dido Harding, is cold comfort for customers, but what lessons must we keep learning?
How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.
the hard lesson learned from this exercise is the ability to identify those people whom I can add to my short list of truly trusted advisors and add myself to my superior's list of truly trusted advisors.
When I ask someone what they think, I want the responder to apply their logic. When I ask what they feel I expect their emotions
The U.S. and several Southeast Asian nations have been harshly critical of China for expanding several coral reefs through dredging in the South China Sea, and building a runway on one of them, actions that the Americans fear may be used for military operations.