U.S. government issues guidance for developers to secure the software supply chain: Key takeaways
Software supply chain attacks are on the rise, as cited in the Cloud Native Computing Foundation’s (CNCF’s) Catalog of Supply Chain Compromises. Industry leaders such as the Google, Linux Foundation,…
Russia’s cyber future connected at the waist to Soviet military industrial complex
The Center for European Policy Analysis (CEPA) recently published a 38-page study, Russian Cyberwarfare: Unpacking the Kremlin’s Capabilities by two esteemed researchers, Irina Borogan and Andrei Soldatov. The opening premise…
Webworm Hackers Using Modified RATs in Latest Cyber Espionage Attacks
A threat actor tracked under the moniker Webworm has been linked to bespoke Windows-based remote access trojans, some of which are said to be in pre-deployment or testing phases. “The…
How CIOs can learn from Mastercard’s Five Cs for building IT teams
All indications are that Mastercard’s vision for creating teams built around the so-called “Five Cs” – community, common vision, cross-functionality, culture, and Cutting edge – works. Two years after its…
Comment les DSI peuvent s’inspirer des 5C de Mastercard pour bâtir leurs équipes informatiques
Tout indique que cette vision construite autour des « 5C » (pour Community, Common vision, Cross-functional, Culture et Cutting edge) fonctionne. Seulement deux ans après son ouverture à Vancouver, les 230 employés…
What CIOs get wrong about optimization
As a CIO a lot of what you do is to design stuff, and that’s when you aren’t overseeing other people who design stuff. Or when you aren’t making sure…
CIO Ralph Loura on empathetic leadership that delivers results
Ralph Loura’s journey to his current role as Lumentum’s senior vice president IT and CIO encompasses some of the most well-known technology and consumer products companies around, including Rodan + Fields,…
How democratized technology is redefining the CIO landscape
Technological disruptions continue to redefine the CIO role within corporations. As innovators and value creators, CIOs are charged with managing developments like low-code/no-code (LCNC), which is revolutionizing user-generated innovation by…
6 Ways Ransomware Attacks Harm Businesses And Consumers
Ransomware attacks are big business for hackers with some amassing millions of dollars from a single attack. This was the case when CNA Financial paid some $40 million to retrieve…
FBI: Millions in Losses resulted from attacks against Healthcare payment processors
The FBI has issued an alert about threat actors targeting healthcare payment processors in an attempt to hijack the payments. The Federal Bureau of Investigation (FBI) has issued an alert…