Remove Article Remove Compliance Remove CTO Remove Security
article thumbnail

Broadcom Software CTO: Charting a Course to Software Modernization

CIO

By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software. This article was originally published here by Andy Nallappan. Broadcom Software CTO Andy Nallappan. The enterprise software that underpins day-to-day operations is under significant strain at many organizations.

Software 244
article thumbnail

#760 How to talk Cybersecurity with your C-Suite in 2024 with Chris McKie & Matthé Smit from Datto

Modern CTO

We discuss how to have the cybersecurity conversation with c-suite executives, the ransomware threats that aren’t going anywhere anytime soon, and why the smallest stupid oversights often lead to the biggest breaches. All of this right here, right now, on the Modern CTO Podcast! To learn more about Datto, visit their website here.

How To 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT leader’s survival guide: 8 tips to thrive in the years ahead

CIO

One area of focus for Srivastava is how to stay in compliance with various regulations, already a heady task, when considering both privacy and cybersecurity. It can be difficult to adapt quickly as technology advances, while working to comply with varying regulations across state lines and borders.

CTO 348
article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. Learn how the cyber world changed in areas including artificial intelligence, CNAPP, IAM security, government oversight and OT security. Cybersecurity teams were no exception.

article thumbnail

Extra Crunch roundup: ‘Nightmare’ security breach, Poshmark’s IPO, crypto boom, more

TechCrunch

Complete articles are only available to members, but you can use discount code ECFriday to save 20% off a one or two-year subscription. The breach of FireEye and SolarWinds by hackers working on behalf of Russian intelligence is “the nightmare scenario that has worried cybersecurity experts for years,” reports Zack Whittaker.

Retail 263
article thumbnail

How Continuous Monitoring Helps Businesses with Risk Assessment and Management

Exadel

Continuous monitoring was also included in the six obligatory steps in Risk Management Framework by the National Institute of Standards and Technology (NIST), ensuring compliance with the Federal Information Security Act (FISMA), so it is an important process that may help your company to establish systems’ security and sustainability.

article thumbnail

How Continuous Monitoring Helps Businesses with Risk Assessment and Management

Exadel

Continuous monitoring was also included in the six obligatory steps in Risk Management Framework by the National Institute of Standards and Technology (NIST), ensuring compliance with the Federal Information Security Act (FISMA), so it is an important process that may help your company to establish systems’ security and sustainability.