Digital acceleration at Stanley Black & Decker places data at the center

Digital acceleration at Stanley Black & Decker places data at the center

For Stanley Black & Decker, digital technologies are transforming every aspect of the company, from internal operations to customer experience to the products and services themselves. Recently, I spoke with Rhonda Gass, CIO, about her approach to strategy, architecture, and change management as well how her CIO role is evolving now and into the future. What follows is an edited version of our interview. Martha Heller: How is Stanley Black & Decker currently deploying digital…

Read More

5 Keys to Creating a Zero-Trust Security Foundation

5 Keys to Creating a Zero-Trust Security Foundation

By Jon Green, Vice President and Chief Security Technologist Recent high-profile attacks have disrupted global commerce across the world, bringing home the critical importance of maintaining a robust IT security program. The recent ransomware attacks on the Colonial Pipeline, the largest petroleum pipeline in the US, and meat supplier JBS, highlight the cascading, society-disrupting havoc these types of attacks can create. Those concerns increasingly extend to IoT devices, as evidenced by the recent hack of…

Read More

The many ways a ransomware attack can hurt your organization

The many ways a ransomware attack can hurt your organization

Loss of revenue, brand and reputation damage, employee layoffs and business closures were some of the effects of a ransomware attack, according to Cybereason. vchal, Getty Images/iStockphoto Ransomware attacks can devastate an organization in obvious ways, most notably by preventing it and its customers or users from accessing critical data and resources. But such an attack can also have longer lasting and far wider consequences. A report released Wednesday by cybersecurity firm Cybereason looks at…

Read More

NHS Test and Trace Bolsters its Cybersecurity

NHS Test and Trace Bolsters its Cybersecurity

NHS Test and Trace has announced that an early-stage UK company will be in charge of managing its supply chain cybersecurity risks. Risk Ledger, which was part of the fourth cohort of the government-backed London Office for Rapid Cybersecurity Advancement (LORCA) program to promote cyber scaleups, will allow NHS Test and Trace to utilize its ‘social network’ platform. The platform will enable organizations to connect and share risk data securely, quickly and easily. This move is particularly…

Read More

Dell Technologies Hires Chuck Whitten as co-Chief Operating Officer | Dell Technologies

Dell Technologies Hires Chuck Whitten as co-Chief Operating Officer | Dell Technologies

ROUND ROCK, Texas, June 16, 2021 /PRNewswire/ — Dell Technologies (NYSE:DELL) announces Chuck Whitten as its co-chief operating officer (co-COO), effective August 16, 2021. Whitten joins Vice Chairman and co-COO Jeff Clarke and Chairman and CEO Michael Dell to lead Dell’s next phase of growth. “Coming off a record FY21 and first-quarter of FY22, we are growing and our opportunity is growing even faster. Chuck joins the company at a pivotal time to give us greater…

Read More

Cisco SD-WAN on AWS Helps ENGIE Become Cloud First – Cisco Blogs

Cisco SD-WAN on AWS Helps ENGIE Become Cloud First – Cisco Blogs

Headquartered in France, ENGIE is a global leader in low-carbon energy and services with more than 160,000 employees worldwide. ENGIE works to accelerate the transition towards a carbon-neutral world through reduced energy consumption and the advancement of more environmentally friendly solutions. With this global mission in its sights, ENGIE needed a network that embraced its strategy and vision to push toward digital solutions. Launching a “Cloud First” initiative, ENGIE’s strategy involved pushing all new applications to the…

Read More

Operational Maturity Delivers Great Results, But Where Do You Start? – Cisco Blogs

Operational Maturity Delivers Great Results, But Where Do You Start? – Cisco Blogs

It’s widely known the pandemic increased the pace of digital transformation. Yet IT teams continue to face challenges and rising complexity, which threaten to curtail the digital agility they need to adapt to rapidly changing customer expectations and market forces. As shown in Cisco Connected IT Insights, our interactive experience built using the huge volumes of anonymized data generated by our customer base, there’s been a sharp increase in the number of anomalies detected per…

Read More

Football Fever Undermining Password Security

Football Fever Undermining Password Security

Security experts have urged users to think more carefully about their password choice after spotting as many as one million based on simple football-related words. Authentication firm Authlogics manages a Password Breach Database — a collection of previous stolen or cracked credentials which that allows it to spot trends and offer industry advice. It claimed that of the one billion passwords in the trove, over 1.1 million are linked to the beautiful game. These are led…

Read More

Most Ransomware Victims Hit Again After Paying

Most Ransomware Victims Hit Again After Paying

Some 80% of global organizations that have paid a ransom demand experienced another attack, often at the hands of the same threat actors, according to a new study from Cybereason. The security vendor polled 1,263 cybersecurity professionals in multiple verticals across the US, UK, Spain, Germany, France, the United Arab Emirates, and Singapore to compile its latest report, Ransomware: The True Cost to Business. It confirmed what law enforcers and commentators have been saying for some…

Read More

IoT Supply Chain Bug Hits Millions of Cameras

IoT Supply Chain Bug Hits Millions of Cameras

Security experts have warned of a critical IoT supply chain vulnerability that may affect millions of connected cameras globally, allowing attackers to hijack video streams. Nozomi Networks revealed the flaw in a popular software component from ThroughTek, which OEMs use to manufacture IP cameras, baby and pet monitoring cameras, and robotic and battery devices. The bug itself is found in a P2P SDK produced by the firm. In this case, P2P refers to functionality that…

Read More
1 3,317 3,318 3,319 3,320 3,321 3,586