article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

Five little vendors access your data. The first one said, "For this company, vendor management doesn't seem to matta." The fourth one said, "Regulation requires vendor control." The fourth one said, "Regulation requires vendor control." Wooooo went the malware. And out went the apps.

article thumbnail

ATMs Are IT Too!

Cloud Musings

Specific problems include physical security of the cash inside the terminal, malware threats to software and the use of data skimming devices. In this strategy shift, they are looking for a provider that brings broad multi-vendor management skills and analytics-based, proactive technical support.

IBM 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Our Tools Against Us: Adversaries Continue To Abuse Trust In The Supply Chain

Forrester IT

I believe that GLaDOS (the evil AI from the Portal video game franchise) may have been trying to make a point about the state of security with her song “Still Alive.” The fictional, artificially super intelligent computer system from Portal once sang, “…But there’s no sense crying over every mistake.

Tools 285
article thumbnail

7 challenges facing CIOs and IT leaders in 2020

mrc's Cup of Joe Blog

photo credit: JavadR via pixabay cc In case you’re unfamiliar, ransomware is exactly what it sounds like: Malware that holds your files ransom. Here’s an article that explores 6 ways to bridge the skills gap. Protecting against the growing ransomware threat. You’re forced to pay a ransom payment to restore file access.