5 steps CISOs can take to increase supply chain visibility

5 steps CISOs can take to increase supply chain visibility

5 steps CISOs can take to increase supply chain visibility | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Overdependence on PCs and servers drag Intel down

Overdependence on PCs and servers drag Intel down

A combination of macroeconomic headwinds and internal problems led to Intel’s revenue dropping 22% to $15.3 billion in the second quarter of 2022, marking the seventh straight quarter of decline for the chipmaker. Revenue was also 15% below the company’s original guidance for the quarter. “Due to the difficult macroeconomic environment together with our own execution challenges, our results for the quarter were well below expectations and necessitate a significant revision to our full-year financial…

Read More

Airports, Bridges, and Beltways

Airports, Bridges, and Beltways

Cyber and Physical Transportation in the Transportation Industry By Alan Cunningham, Journalist, Truth Be Told Like with most other areas of business, government, public safety/service, and society, the transportation system of the U.S. faces a wealth of challenges and threats. For clarity, the transportation sector encompasses “a category of companies that provide services to move people or goods, as well as transportation infrastructure…[consisting] of several industries including air freight and logistics, airlines, marine, road and rail,…

Read More

CIO Leadership Live with Sami Yalavac, interim managing director, Bupa Health Services

CIO Leadership Live with Sami Yalavac, interim managing director, Bupa Health Services

In 2006, Sami Yalavac started working at Bupa as a developer and project manager. Ten years later, he was appointed as chief information officer, a role he held until only two months ago when he was elevated to interim managing director for Bupa Health Services following the departure of incumbent, Dwayne Crombie.In this episode of CIO Leadership Live Australia, Sami Yalavac talks to CIO Australia’s editor-in-chief, Byron Connolly, about how he is finding the role…

Read More

Darrin Reynolds named CISO at Edgio

Darrin Reynolds named CISO at Edgio

Darrin Reynolds named CISO at Edgio | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Strategies for third-party risk management in healthcare

Strategies for third-party risk management in healthcare

Strategies for third-party risk management in healthcare | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Northwestern University study says opioid crisis will become ‘worse than ever before”

Northwestern University study says opioid crisis will become ‘worse than ever before”

Northwestern University study says opioid crisis will become ‘worse than ever before” | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

The CIO’s guide to mastering IT trends

The CIO’s guide to mastering IT trends

Monitoring IT trends is no trivial task. After all, the deluge is considerable. Every day, single-shingle IT cognoscenti blog, tweet, and podcast their thoughts about the future of IT. Every week, vendors — the supply side of the tech community — release whitepapers and forecasts about where they think (or hope you will think) technology is going. Every month, consultancies, research firms, the press — the tech community’s services side — adjust and amplify annual…

Read More

Networking 101: Cultivate your weakest links

Networking 101: Cultivate your weakest links

What if everything you believed about networking was wrong? What if a network of people you barely know is more likely to advance your career than your strongest, closest connections? This counterintuitive notion—and the research supporting it—dates back to 1973 when Stanford sociology professor Mark Granovetter published “The Strength of Weak Ties.” His research paper upended the world of social networking theory by showing how the “weak ties” people have through acquaintances or distant social…

Read More

Euro Police Bust €3m Internet Fraud Gang

Euro Police Bust €3m Internet Fraud Gang

Spanish and Romanian police have joined forces to take down a gang suspected of earning at least €3m ($3.1) from internet scams. Spanish National Police arrested three suspects in the southern city of Malaga while their Romanian counterparts cuffed six, following a multi-year investigation, according to Europa Press. They are accused of publishing false adverts for second-hand vehicles and other products. In some cases, they’d re-publish legitimate ads but change the contact details. They would…

Read More
1 2,809 2,810 2,811 2,812 2,813 4,084