Remove category customer-impact
article thumbnail

Dunkin Donuts Forced to 'Fill Security Holes' in Data Breach Settlement

SecureWorld News

According to state investigators, Dunkin' Donuts failed to respond to a series of successful cyber attacks that left tens of thousands of customer's online accounts vulnerable. Now the company is being forced to take certain information security measures and pay a $650,000 fine to the state of New York.

article thumbnail

Disruption Doesn’t Make an Appointment. A Guide for Handling the Unwelcome Knock.

CIO Business Intelligence

In managing the multiple priorities there are two categories to address: People and Process, and Technology. Engage the Crisis Management Team (CMT) to assess and take actions to contain the impact of the situation. Determine the overall business impact and any other customer contractual obligations. People and Process.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital Risk Management Leader RiskIQ Raises New Funding To Expand Platform Ecosystem, Sales and Digital Risk Applications

CTOvision

Editor's note: When I read of a great firm like RiskIQ investing to expand their platform I immediately think of the positive impact to current and future customers. They know what it takes to develop a business into a customer-focused, long-lasting, and profitable company - values that our entire board of directors shares.”.

article thumbnail

Keeping customers at the center of everything

CIO Business Intelligence

By Hock Tan, Broadcom President and CEO During the 17 years I have led Broadcom, solving problems for customers and giving them the tools they need to succeed have been the most rewarding parts of my job. Once we acquire VMware, we expect to deepen our commitment to customer success by building a more dynamic IT value proposition.

Vmware 58
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. It is bad however.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Ransomware

ForAllSecure

I'm Robert Vamosi, and in this episode I'm going to talk about hacking cryptocurrencies bug bounties, securing our election systems, and yes ransomware and how a high school student has already gained valuable experience in all of the above. Vamosi: Everyone's journey and information security as you need. I have seen that.

Course 52
article thumbnail

The Hacker Mind Podcast: Hacking Ransomware

ForAllSecure

I'm Robert Vamosi, and in this episode I'm going to talk about hacking cryptocurrencies bug bounties, securing our election systems, and yes ransomware and how a high school student has already gained valuable experience in all of the above. Vamosi: Everyone's journey and information security as you need. I have seen that.

Course 52