article thumbnail

The Week in Security: Former Uber CSO convicted over hack cover-up, supply chain attack targets media

Security Boulevard

This week: Former Uber CSO is convicted for his attempted cover-up of a 2016 hack of the company. Also: A software supply chain attack has pushed out malware to at least 250 media sites. .

CSO 69
article thumbnail

Social media use can put companies at risk: Here are some ways to mitigate the danger

CSO Magazine

For many, the answer to that is increasingly no—that's why laws and regulations have recently been put in place restricting access to some social media in certain situations because of the hidden risks of these seemingly innocuous platforms. We live in a social world, but should our businesses?

Media 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

The media paid close attention to ransomware attacks last year, as they had a significant impact on Colonial Pipeline, the nation’s largest fuel distributor, and JBS, the nation’s largest meat distributor. You’ll significantly reduce your risk if you enforce a minimum security bar for all devices accessing your data. Best practices.

article thumbnail

UK government considers strengthening security rules for MSPs to address supply chain risks

CSO Magazine

The UK government’s Department for Digital, Culture, Media and Sport (DCMS) is considering new measures to enhance the security of digital supply chains and third-party IT services. Learn the 7 keys to better risk assessment. | Get the latest from CSO by signing up for our newsletters. ]. . |

Risk 94
article thumbnail

Exiger launches data-agnostic supply chain risk platform

CSO Magazine

New York-based risk management company Exiger this week launched a new supply chain risk monitoring service, designed to incorporate a wide and customizeable array of data sources into its calcluations.

Risk 114
article thumbnail

US Supreme Court leak investigation highlights weak and ineffective risk management strategy

CSO Magazine

decision to media outlet Politico has come up empty. In a nutshell, the court’s insider risk management program, designed to protect the information the justices handle on a daily basis, failed—and failed miserably. Jackson Women’s Health Org.

Risk 97
article thumbnail

How posting personal and business photos can be a security risk

CSO Magazine

Marketers in every industry enjoy evidencing their reach to their superiors and providing tangible examples of their width and breadth of influence via social networks, media, and other means of engagement.

Risk 127