Remove 4-core-software-security-problems-what-do-about-them
article thumbnail

4 core software security problems—and what to do about them

TechBeacon

What’s worse, recent research from Stanford University Professor Jeff Hancock and security firm Tessian found that 88% of breaches are caused by human error. In 2020, in the US alone, more than 37 billion records were exposed in nearly 4,000 reported data breaches.

Software 105
article thumbnail

Push Security launches to make SaaS sprawl and shadow IT safer

TechCrunch

Software-as-a-service (SaaS) has emerged as a pan-industry force by just about every estimation. This is something that London-based Push Security is setting out to solve, with a platform that enables employees to use whatever SaaS apps they need for their jobs, without compromising basic security principles.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 things keeping IT leaders up at night

CIO

CIOs are hardly Luddites, but even some technologists fret about artificial intelligence, the rapid pace of tech evolution, and their ability to keep up. Yet CIOs do admit that they’re worried about multiple issues these days. Recent figures do nothing to ease anxiety. Here are 10 worries keeping IT leaders up at night.

article thumbnail

Cybersecurity Snapshot: Want to Deploy AI Securely? New Industry Group Will Compile AI Safety Best Practices

Tenable

A group that includes the Cloud Security Alliance, CISA and Google is working to compile a comprehensive collection of best practices for secure AI use. Meanwhile, check out a draft of secure configuration recommendations for the Google Workspace suite. Dive into six things that are top of mind for the week ending December 15.

Groups 72
article thumbnail

8 strategies for accelerating IT modernization

CIO

There is a ton of competitive pressure to move fast, because those who can do things quicker, better, faster are the ones winning the market share,” says Ricardo Madan, senior vice president of TEKsystems Global Services. Companies that do well have turned modernization into a process instead of an event.

Strategy 351
article thumbnail

Hybrid meetings: 5 best practices for better outcomes

CIO

When asked what they would do if they had to return to the office full-time, a recent study from PromoLeaf found that more than half (52%) of remote workers would quit. People do miss seeing their coworkers, though. People do miss seeing their coworkers, though. What is a hybrid meeting? “A

Meeting 321
article thumbnail

Vulnerability and risk management: How to simplify the process

Ivanti

It’s like a faded Polaroid from a bygone era: The day when a computer with centralized software was safely locked away in an office. Software and applications (increasingly cloud-based and largely outside an organization’s control). In this concise IT risk management guide, we’ll cover: What is IT risk management?

How To 71