Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Cybersecurity Risks and Vulnerabilities with Third-Party Vendors

Third-party vendors, contractors, and partners are often an integral part of an organization’s operations. However, they can also pose significant security risks if not properly managed, with poor cybersecurity practices increasingly becoming a major contributing factor to supply chain disruptions. If your organization relies on third parties for anything, understanding and managing their risk should be at the top of your list.

CISO Global Appoints Tech Veteran Brett Chugg To Board Of Directors; Chugg To Help Usher In Next Stage Of Growth

CISO Global has named Brett Chugg to its Board of Directors. With the appointment of tech veteran Chugg, CISO Global is well positioned for its next stage of growth underpinned by its software-first product platform strategy.

Mobile Matters: Keep Your Data Safe

Some of you may remember when phones were primarily used for making phone calls. In today’s rapidly evolving digital landscape, our smartphones and tablets have transformed into multifunctional devices, serving as mini-computers, high-resolution cameras, and indispensable companions in our daily lives. They seamlessly keep us connected to the world, offering endless avenues for communication and entertainment.

Bleeding Credit Unions Dry: The Story of Sloppy and Broken Operations

How vulnerable are credit unions, the bedrock of community finance, to rapidly advancing cyber threats? Very. Join CISO Global's Chris Clements, Tigran Safari, James Montagne, and special guest Iwona Karpeta as they discuss recent attacks against credit unions, how they responded, and how their customers were impacted. Speakers: Chris Clements is the VP of Solutions Architecture for CISO Global. Chris has spent more than two decades working in the information security field and has a wide range of experience, including business management, sales, product, and service delivery.

Back to the Basics: Security Must-Haves for 2024, Part II

There is a tendency to be overwhelmed with the sheer volume of work that must be done in IT and security. While the experts debate on whether it is difficult or easy to do the work required, we’re focusing on the basics here. There are several components that need to be addressed, but none should be overwhelming. Remember, these are the basics of having a security posture that is defensible to your customers and regulatory bodies.

Strengthening Cybersecurity in Local Government

In the ever-evolving cybersecurity landscape, organizations are constantly striving to enhance their defenses against organized malicious actors. As cyber attacks become more advanced, regulatory bodies have created and enforced compliance requirements to ensure that organizations protect sensitive data and systems. One groundbreaking solution that can help your organization meet these challenges is Extended Detection and Response, known as XDR.