CIO.com reported that “Digital success requires a product-based approach to IT — and a shift to persistent rather than per-project funding. Here’s how to address your CFO’s concerns about costs and risks.  CFOs want certainty when it comes to spend. And they want to know exactly how much return on investment

Continue Reading CIOs need to work with CFOs for better IT funding!

BankInfoSecurity.com reported that “Artificial intelligence technologies such as generative AI are not helping fraudsters create new and innovative types of scams. They are doing just fine relying on the traditional scams, but the advent of AI is helping them scale up attacks and snare more victims, according to fraud researchers

Continue Reading Payments Fraud is faster and easier with AI!

CIO.com reported that “Years into strategies centered on adopting cloud point solutions, CIOs increasingly find themselves facing a bill past due: rationalizing, managing, and integrating an ever-expanding lineup of SaaS offerings — many of which they themselves didn’t bring into the organization’s cloud estate.” The March 15, 2024 article entitled

Continue Reading CIOs need to take the time to think about legal issues in SaaS!

SCMagazine.com reported that “Dallas-based UT Southwestern Medical Center had data from almost 2,100 individuals compromised following a data breach, The Dallas Morning News reports.”

The March 12, 2024 report entitled “UT Southwestern breach hits over 2K patients” (https://www.scmagazine.com/brief/ut-southwestern-breach-hits-over-2k-patients) included these comments a UT Southwestern spokesperson:

We are assessing

Continue Reading  Healthcare breach at UT Southwestern!

Computerworld.com reported that “More than 150 leading artificial intelligence (AI) researchers, ethicists and others have signed an open letter calling on generative AI (genAI) companies to submit to independent evaluations of their systems, the lack of which has led to concerns about basic protections. The letter, drafted by researchers from MIT

Continue Reading Will the major Generative AI vendors allow an academic investigation of their security?

DarkReading.com reported that “New guidance expands the frame to consider organizations beyond critical infrastructure; it also addresses governance and supply chain cybersecurity.”  The February

 26, 2024 Report entitled “NIST Releases Cybersecurity Framework 2.0” (https://www.darkreading.com/ics-ot-security/nist-releases-cybersecurity-framework-2-0) which included these comments:

The new framework builds on its long-standing, cyber-risk-reducing recommendations to

Continue Reading Good news! NIST Releases Cybersecurity Framework 2.0!

SCMagazine.com reported that “The U.S. government has been focused on protecting critical infrastructure this week with a push by CISA, the EPA and FBI to educate the water and wastewater systems sector on how to better secure their facilities from cyberattacks – and the Feb. 21 Biden administration executive order

Continue Reading China cyber threat to US Water Systems!

CIO.com reported that “After years of marching to the cloud migration drumbeat, CIOs are increasingly becoming circumspect about the cloud-first mantra, catching on to the need to turn some workloads away from the public cloud to platforms where they will run more productively, more efficiently, and cheaper.”  The February 27

Continue Reading Finally CIOs have realized that Cloud Computing has been oversold and are ready to move back to On-Prem!

SCMagazine.com reported that “A multinational operation involving law enforcement agencies from 11 countries has struck a decisive blow to the LockBit group, the world’s most prolific ransomware-as-a-service (RaaS) gang. A taskforce of 17 agencies including the FBI, the UK’s National Crime Agency (NCA), and Europol took control of key LockBit

Continue Reading LockBit, the most prolific RaaS (Ransomeware-as-a-Service), struck by 11 counties!

SCMagazine.com reported that Department of Justice Press Release (http://tinyurl.com/26zn8wbt) that “A January 2024 court-authorized operation has neutralized a network of hundreds of small office/home office (SOHO) routers that GRU Military Unit 26165, also known as APT 28, Sofacy Group, Forest Blizzard, Pawn Storm, Fancy Bear, and Sednit, used

Continue Reading Small Office/Home Office (SOHO) routers which have been part of a Russian large credential-harvesting has been dismantled by the FBI!