article thumbnail

Women IT leaders take center stage

CIO Business Intelligence

Cultivating visibility matters for a few reasons,” says Kathryn Guarini, a former IBM CIO and now a board member at Regeneron Pharmaceuticals. Kathryn Guarini, board member, Regeneron Pharmaceuticals, and former IBM CIO Guarini “You want to be the one considered for opportunities to have an impact,” she says.

IBM 130
article thumbnail

Read This If You Do Business in China

SecureWorld News

According to the Flash report, this threat is believed to have existed since 2016, with several encounters since the June 2020 incident: In July 2018, an employee of a US pharmaceutical company with business interests in China downloaded the Baiwang Tax Control Invoicing software program from baiwang.com.

Malware 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

J&J’s Jim Swanson brings mission-driven leadership to the CIO role

CIO Business Intelligence

He started out as a scientist, working his way up the research and development ranks in the pharmaceutical industry, an experience steeped in curiosity that has helped shape his emphasis on continuous learning to this day.

article thumbnail

New Alert: Russian Hackers Are Targeting COVID-19 Research

SecureWorld News

The NCSC and CISA are currently investigating a number of incidents in which threat actors are targeting pharmaceutical companies, medical research organisations, and universities. Use multi-factor authentication to reduce the impact of password compromises. Prevent and detect lateral movement in your organization’s networks.

article thumbnail

Ryuk Ransomware Evolution: Now 'Wormlike'

SecureWorld News

And the cybersecurity agency highlighted a significant, and new, discovery: "A Ryuk sample with worm-like capabilities allowing it to spread automatically within networks it infects, was discovered during an incident response handled by the ANSSI in early 2021.". The new version of Ryuk ransomware.

Malware 94
article thumbnail

Hashing from A to Z

Dataconomy

Hash functions are essential to the security and integrity of blockchain networks, ensuring the immutability of transaction records. Hash functions are also the foundation of digital signatures, serving to confirm the authenticity and integrity of digital documents and transactions.

article thumbnail

Storytelling for CIOs: From niche to bestseller

CIO Business Intelligence

The late Richard Sykes, CIO of pharmaceuticals giant ICI in the 1990s and later a columnist for CIO magazine, famously scripted starkly different scenarios of the future of ICI for board members early in his IT role. “For Miguel Traquina, CIO of biometric authentication company iProov, agrees. Why tell stories?