Remove Development Team Review Remove Infrastructure Remove Vendor Management
article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO

In addition, CrowdStrike hired two independent software security vendors to review the Falcon sensor code, its quality control, and release processes, and also changed how its updates are released: more gradually, to increasing rings of deployment, says Adam Meyers, CrowdStrikes SVP for counter adversary operations. Trust, but verify.

article thumbnail

The STA is realizing potential in predictive analysis and automation

CIO

Finding patterns Incident management is another area being tackled. Day and night, the STA monitors its infrastructure — roads and railways, as well as IT and telecoms — and registers and resolves incidents. As an authority, we must look at and critically review the answers we receive and not blindly trust them,” he says. “An

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 best practices when partnering for strategic skills

CIO

IT leaders must rigorously assess their partners’ talent management and development strategies, build greater trust and transparency into the relationships, and invest in greater partner governance. Many of the new skills are in rare supply, as are team leaders experienced in this new development paradigm.”

article thumbnail

What CIOs are in for with the EU’s Data Act

CIO

The Data Act also implements safeguards against illegal data transfers by cloud providers, and provides development of interoperability standards for reuse of data across sectors. For this reason, the Data Act promotes the development of smart contracts, or automated agreements, that execute transactions based on predefined conditions.

Data 117
article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Cyber Safety Review Board published a 50-plus page report on the Log4j event, and a key takeaway was that Log4Shell is an “endemic vulnerability” that’ll be around for a decade — or perhaps longer. . Source: Accenture Cyber Threat Intelligence team, December 2022). Cybersecurity and Infrastructure Security Agency -- CISA).

article thumbnail

The biggest enterprise technology M&A deals of the year

CIO

Already this year, there are numerous smaller M&A deals, as enterprise software providers buy their way into new markets or acquire new capabilities rather than develop them in house. Perforce Software, a privately held provider of software development tools, has agreed to buy the infrastructure automation software platform Puppet.