Remove Business Services Remove Cyber Risk Remove Software
article thumbnail

Episode 243: The CSTO is a thing- a conversation with Chris Hoff of LastPass

The Security Ledger

Paul talks with Chris Hoff the Chief Secure Technology Officer at LastPass about the CSTO role and the security implications of “software eating the world.”. at the password management firm LastPass, what the CSTO role entails and how companies need to do more to confront the security implications of “software eating the world.”

CISO 52
article thumbnail

With thousands of vendors, companies typically have limited grasp over supply chain security

SC Magazine

Cyberattacks against SolarWinds and other widely implemented software offerings exposed a supply chain rife with exploitable weaknesses. Cyberattacks against SolarWinds and other widely implemented software offerings exposed a supply chain rife with exploitable weaknesses. Stephen Foskett/ CC BY-NC-SA 2.0 ).

Risk 70
article thumbnail

Cyber security guidance for small fleet operators

Pen Test Partners

They may be motivated by financial gain, getting hold of sensitive data, or just disrupting to your business. Four common of cyber-attacks are: Malware attack malicious software is installed on your machines. This awareness training aims to improve the security of IT systems to that OT systems are not exposed to risk.