Entries by Hunter Smith

,

How Use Cases Help Sell Digital

Learn how to better incorporate use cases into your conversations with technology prospects and customers: JULY 23, 2019  6 MINS READ  Share on Facebook Share on Twitter This post originally appeared on IDC’s UK Blog, and concentrates on European data. To see the original post, click here. “Digitally determined” organizations no longer ask if something is possible. […]

The World Economy Is Suddenly Running Low on Everything

 ‘It is anything but efficient or normal.’ Surging corporate demand is upending global supply chains. By Brendan Murray, Enda Curran, and Kim Chipman May 16, 2021, 9:01 PM PDT The Big Supply Crunch Supply Lines is a daily newsletter that tracks trade and supply chains disrupted by the pandemic. Sign up here. A year ago, as the pandemic […]

,

Six Best Practices For Ransomware Recovery And Risk Mitigation

Getty Images Apr 22, 2021,08:50am EDT|606 views Stu Sjouwerman Forbes Councils Member Forbes Technology Council COUNCIL POST| Membership (fee-based) Innovation Stu Sjouwerman is the Founder and CEO of KnowBe4 Inc., the world’s largest Security Awareness Training and Simulated Phishing platform.  The threat of ransomware to the global business environment has reached epidemic proportions. According to […]

Microsoft warns of PrintNightmare vulnerability due to flaw in Windows Print Spooler

Credit: Pixabay/CC0 Public Domain by Bob Yirka , Tech Xplore Microsoft and multiple other entities are warning users and entity operators of a vulnerability in Windows Print Spooler that can allow criminals to hack into Windows computers and remotely execute code. In its post on the company’s Security Update Guide, Microsoft labels the vulnerability as CVE-2021-34527, noting […]

Week In Breach

This week we’re exploring why Cox TV & radio stations went dark because of cybercrime, how third-party danger ensnared New South Wales Health, what happened when nation-state cybercriminals visited New York and how you can notch quick wins by using specialized location and industry data to sell security. United States iConstituent https://www.nbcnews.com/politics/congress/house-communications-vendor-compromised-ransomware-attack-n1269934 Exploit: Ransomware IConstituent: Communications […]

Week in Breach

April 14th, 2021 by ID Agent Cybercriminals leak the PII of millions of professionals in a new LinkedIn breach, an unwelcome visit by nation-state hackers exposes data at BlueCross BlueShield DC and kicking off Supply Chain Security Month with fresh tips for mitigating two major third-party and supply chain risks plus handy resources to brush […]

,

Week in Breach

March 3rd, 2021 by Kevin Lancaster This Week in Breach News: Bombardier and Steris get caught up in a third-party data breach, troubled crypto exchange Cryptopia gets hacked again and the shockingly large percentage of data breaches that are email-based (plus how to help businesses fight back). United States – Gab https://www.hackread.com/gab-hacked-ddosecrets-leak-profiles-posts-dms-passwords-online/ Exploit: Hacking Gab: Social Media Platform Risk […]

, , ,

How the CFO and CIO collaborate to create, optimize and protect value

By Brian Moore   EY Americas Tech Transformation and Trusted Intelligence Leader 5 minute read19 Feb 2021 Organizations must consider foundational transformation rather than quick fixes and ad hoc investments to give them the agility to adapt. Chief financial officers (CFOs) have always worked with other leaders, such as chief information officers (CIOs) and external stakeholders […]