article thumbnail

How CISOs Can Reduce Third-party Attack Vectors

Pure Storage

Just as important: Can the apps’ customers—the intended targets—monitor and police all their vendors to make sure they’re taking all of the appropriate security measures? Chief Risk Officer Supply chain and vendor security are top of mind for CISOs, including those who took part in the recent Pure Storage CISO roundtable.

Audit 52
article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

How to Implement Threat Modeling in Your DevSecOps Process by Pure Storage Blog This blog on threat modeling was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. Dr. Ahuja is a renowned name in the field of security and networking.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SIA New Member Profile: IXP Corporation

Security Industry Association

New Security Industry Association (SIA) member IXP Corporation provides emergency communications consulting, technology and managed services for public safety, governments, campuses and private industry. Michael Anderson, director of security services at IXP Corporation Michael Anderson : IXP Corporation is a public safety services company.

article thumbnail

If Cyber is Material, Then Boards are Accountable

FS-ISAC

Security leaders must educate their boards on an ongoing basis, speaking language they can understand and ensuring their updates stimulate engagement and dialogue, rather than a download of technical jargon. We manage our third parties via contractual security obligations as well as risk assessments.

article thumbnail

Pure Storage Announces Breakthrough STAC-M3 Benchmark Testing Results for High-performance and Quantitative Trading

Pure Storage

Pure Storage Announces Breakthrough STAC-M3 Benchmark Testing Results for High-performance and Quantitative Trading by Pure Storage Blog In the fast-paced world of high-frequency and quantitative trading , every microsecond counts. This is the first solution Pure Storage has submitted for a STAC-M3 audit. β1.10T.THEOPL.TIME).

article thumbnail

Important KPIs for Successful Vendor Management

Reciprocity

After acceptable risk levels have been established, evaluate vendors’ security performance — and if a vendor’s cybersecurity is too lax for your tastes, require that vendor to make improvements as necessary. Benchmark multiple vendors’ performance. Therefore, you need to monitor its security often, if not constantly.

article thumbnail

What is MLOps and Why Do You Need It?

Advancing Analytics

Data Scientists will be able to track experiments, models and parameters to allow them to benchmark performance against other models or return to previous models. There are many things you will need to consider including size of the model, minimum latency requirements, A/B testing, autoscaling and security access. Monitor Phase.