article thumbnail

“The Blob” Is Poisoning The Security Industry

Forrester IT

In a 2016 New York Times Magazine profile of Ben Rhodes, President Obama’s then deputy national security adviser for strategic communications, Ben was quoted as calling the American foreign-policy establishment “the Blob.”

Security 465
article thumbnail

The Power of Anonymity in Supply Chain Security

CTOvision

Read Adrien Gendre’s analytical article about why anonymity is an important aspect of supply chain security on Infosec Magazine : The SolarWinds breach of 2020 was widely considered the biggest cyber-attack in history. Just three months later, the Microsoft Exchange hack took its place.

Security 336
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Optimizing IoT Security by Implementing Artificial Intelligence

CTOvision

Read Liqaa Nawaf explain how artificial intelligence can help in optimizing Internet of Things security on Infosec Magazine : The Internet of Things (IoT) is growing rapidly in the markets […].

article thumbnail

Centralized supply chain security programs yield efficiency

CTOvision

Read Kirsten Provence argument for a centralized supply chain program on Security Magazine : Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain.

article thumbnail

Detecting and Mitigating IoT Breaches Require An “Inside-out” Approach to Security

CTOvision

Read why Dmitry Raidman says that detecting and mitigating Internet of Things data breaches requires an inside-out approach on Infosec Magazine : A 2020 Business Insider Intelligence research report predicts […].

Internet 315
article thumbnail

Remote Workers Often Not Provided Secure Tools

CTOvision

Read why Dan Raywood says that companies don’t provide secure tools for remote workers risking their cyber assets on Infosec Magazine : The number of employees working from home is […].

Tools 237
article thumbnail

Security officers now require a more comprehensive insider threat solution

CTOvision

Read why Tom Miller says that company security officers need a more comprehensive insider threat solution after the coronavirus pandemic on Security Magazine : COVID-19 has initiated a whole new […].

Security 237