Remove Architecture Remove Development Team Review Remove Vendor Management
article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO

In addition, CrowdStrike hired two independent software security vendors to review the Falcon sensor code, its quality control, and release processes, and also changed how its updates are released: more gradually, to increasing rings of deployment, says Adam Meyers, CrowdStrikes SVP for counter adversary operations. Trust, but verify.

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Cyber Safety Review Board published a 50-plus page report on the Log4j event, and a key takeaway was that Log4Shell is an “endemic vulnerability” that’ll be around for a decade — or perhaps longer. . Source: Accenture Cyber Threat Intelligence team, December 2022). How long will this Log4Shell problem linger? Back in July, the U.S.

article thumbnail

The biggest enterprise technology M&A deals of the year

CIO

Already this year, there are numerous smaller M&A deals, as enterprise software providers buy their way into new markets or acquire new capabilities rather than develop them in house. Perforce Software, a privately held provider of software development tools, has agreed to buy the infrastructure automation software platform Puppet.