#vendor-non-response

[ follow ]
Privacy professionals
fromSecurityWeek
2 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
Marketing
fromForbes
4 days ago

How To Serve Clients Amid Board Scrutiny And Investor Activism

Agency conversations with executives now focus on measurable business impact rather than just creative output.
Careers
fromFortune
5 days ago

Here's how HR leaders can actually get a wellness program approved by their CFO | Fortune

CFOs require a solid business case for wellness programs, focusing on costs, tradeoffs, and measurable returns.
Marketing
fromFast Company
4 days ago

Most companies start PR too late

Businesses should start PR efforts early, not just when major announcements are imminent, to build credibility and visibility.
fromTheregister
1 week ago

ServiceNow salesman sues employer in commission dispute

Costa's then-manager told him that ServiceNow would not pay this commission because the Sales Compensation Department had concluded that Costa had 'overachieved to a degree that was outside normal' in relation to his sales quota. In other words, ServiceNow believed Costa had made too much money, notwithstanding that his commission was only a small percentage of the revenue recognized and received by ServiceNow.
Law
#sustainability
Remote teams
fromTheregister
1 week ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
#cybersecurity
Bootstrapping
fromEntrepreneur
1 week ago

Your Management Strategy Is Doomed to Fail If You Don't Do This

Effective management focuses on execution through a straightforward approach: face reality, investigate issues, fix them systematically, and own the outcomes.
Intellectual property law
fromAbove the Law
2 weeks ago

AI Vendor Contracts: The Terms And Conditions Trap - Above the Law

In-house lawyers must carefully review AI tool contracts to avoid significant data control issues despite attractive pitches of efficiency and cost savings.
fromHarvard Business Review
2 weeks ago

Treat Nonprofits as Strategic Partners, Not Just Philanthropic Recipients

Most for-profit companies still confine nonprofit relationships to corporate philanthropy. Donations flow through foundations, annual reports highlight community contributions, and nonprofit engagement is framed as evidence of corporate responsibility.
Non-profit organizations
Online learning
fromeLearning Industry
2 weeks ago

5 Ways An Extended Enterprise LMS Strengthens Sales Performance

Sales teams require continuous access to knowledge and support through a modern LMS to adapt to dynamic environments and enhance performance.
Agile
fromBusiness Matters
3 weeks ago

How to Avoid Construction Delays and Stay on Schedule

Construction delays can derail projects due to poor planning, resource shortages, and communication breakdowns, but can be mitigated with effective strategies and technology.
Productivity
fromyusufaytas.com
3 weeks ago

Capacity Is the Roadmap

Roadmap success depends on realistic capacity planning, not just prioritization; maintenance, interruptions, and coordination consume significant resources that must be accounted for.
DevOps
fromMedium
3 weeks ago

The Bridge to Bulletproof: Connecting Alloy, Synthetics, and IRM for ShopFast

Integrate infrastructure monitoring, global synthetic probes, and centralized alerting into a comprehensive 24/7 production system that maintains revenue protection while preventing team burnout.
Software development
fromInfoQ
3 weeks ago

QCon London 2026: SBOMs Move From Best Practice to Legal Obligation as CRA Enforcement Looms

Software teams must urgently adopt SBOMs due to imminent regulatory requirements in the US and Europe, with enforcement beginning September 2026 and full compliance required by December 2027.
fromNextgov.com
1 week ago

Agency CIOs must supply top-down IT contract information, OMB memo states

What we want to do is make sure that CIOs are fully empowered to be there at the beginning of conversations, that they are part of the formulation of budget and policy from liftoff.
Privacy professionals
Agile
fromEntrepreneur
3 weeks ago

What Every CEO Should Do When a Customer Claims Your Business Caused Harm

Businesses need a clear, repeatable playbook for handling serious complaints to prevent chaos and control outcomes during critical moments.
Online learning
fromeLearning Industry
3 weeks ago

Can An LMS Really Reduce Compliance Risk Before It Happens?

A strategically positioned LMS reduces compliance risk by ensuring consistent policy communication across organizations and enabling rapid regulatory updates, transforming it from a reporting tool into a proactive risk management system.
Law
fromFortune
3 weeks ago

We're a top investor relations firm and one of us spent over a decade on the inside. Here's what boards need to know. | Fortune

Standard defensive tactics against activist investors often backfire by damaging trust and reducing negotiating leverage instead of protecting company interests.
Business intelligence
fromTNW | Finance
1 month ago

Clarity as strategy

Service-based organizations lack visibility into work profitability, prompting development of platforms like coAmplifi Pro to connect operational activity to financial outcomes.
E-Commerce
fromBusiness Matters
1 month ago

Supplier Verification: A Practical Guide for Smarter Global Sourcing

Supplier verification is a strategic necessity in global trade, requiring thorough assessment of legal status, production capability, quality systems, financial stability, and regulatory compliance before establishing business relationships.
fromTheregister
1 month ago

Bug that wiped customer data saved the day - and a contract

I looked at the config and noticed the customer did not have a default route set. He wasn't sure if that was the problem, so he made some changes he thought might be useful. The router Caleb worked on then rebooted, which he expected. But when it restarted, its previous configuration was gone.
Tech industry
Information security
fromSecuritymagazine
3 weeks ago

Threat Actors Target the Entire Retail Supply Chain

Threat actors exploit shared supply chain vulnerabilities between wholesalers and retailers, with over 70% of retailers and 60% of wholesalers having exposed credentials, enabling widespread initial access.
Agile
fromInfoWorld
4 weeks ago

Save money by canceling more software projects, says survey

Enterprises should cancel underperforming projects more aggressively; those using scenario planning and ruthless viability assessment achieve better ROI outcomes.
Marketing
fromFast Company
1 month ago

B2B purchases aren't made by individuals

B2B marketing success requires engaging entire buying groups with personalized, multi-channel strategies rather than treating demand generation as a volume-based numbers game with generic messaging.
fromeLearning Industry
1 month ago

Thought Leader Q&A: Exploring Result Expectation Alignment And Business Performance Systems With Mario Buljan

The biggest challenge is that Learning and Development is not positioned as a strategic function in many organizations. Instead, L&D often operates as a function for the sake of having a function. It is rarely used by executive leadership as a strategic support capability and is more often treated as a nice-to-have necessity rather than an integral part of business decision-making.
Online learning
Information security
fromThe Hacker News
3 weeks ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
fromComputerWeekly.com
1 month ago

Weighing up the enterprise risks of neocloud providers | Computer Weekly

Neocloud providers, which include the likes of Nscale, CoreWeave and Carbon3.ai, are having a somewhat disruptive impact on the market by making huge commitments to build out hyperscale datacentres in support of the UK government's AI growth agenda. These providers are also taking up capacity in colocation datacentres that some of the hyperscale cloud giants previously committed to renting space in, before pulling out.
Miscellaneous
#board-governance
Business
fromHarvard Business Review
1 month ago

What to Do When Your Board Is Meddling in Operational Work

Boards are increasingly adopting operational roles, blurring governance and management boundaries through private equity-style monitoring as economic uncertainty and AI disruption intensify.
Business
fromHarvard Business Review
1 month ago

What to Do When Your Board Is Meddling in Operational Work

Boards are increasingly adopting operational roles, blurring governance and management boundaries through private equity-style monitoring as economic uncertainty and AI disruption intensify.
DevOps
fromThe Hacker News
1 month ago

New RFP Template for AI Usage Control and AI Governance

Organizations have AI security budgets but lack clear requirements for AI governance solutions, requiring a structured evaluation framework focused on interaction-level control rather than application cataloging.
Information security
fromSecuritymagazine
1 month ago

Why Security Culture Metrics Matter More Than Dashboards

Traditional cybersecurity metrics create false confidence by masking hidden risks; culture metrics measuring employee engagement and responsiveness are essential for actual security effectiveness.
Information security
fromComputerWeekly.com
4 weeks ago

Vulnerability reports: Increase in quantity, decrease in quality? | Computer Weekly

Bug bounty programs face sustainability challenges due to increased low-quality submissions, prompting cURL founder Daniel Stenberg to shut down his HackerOne program and switch to GitHub for vulnerability reporting.
Tech industry
fromTheregister
1 month ago

Contractor held hostage by client who asked for wrong fix

A field engineer completed a server board replacement successfully, but was detained at the datacenter exit when the client claimed an unresolved problem despite the admin's earlier confirmation that everything worked.
Information security
fromComputerworld
1 month ago

Storage vendor offers a real guarantee - but check out those fine-print exceptions

Tech vendors frequently offer performance guarantees with substantial financial penalties, but hidden exceptions in EULAs often make claims difficult or impossible to collect.
Information security
fromSecurityWeek
1 month ago

How to 10x Your Vulnerability Management Program in the Agentic Era

Agentic AI cyberattacks are actively occurring, forcing vulnerability management to evolve from static scanning to continuous, contextual, autonomous remediation systems.
fromBusiness Matters
2 months ago

Compliance Is the New Creative: Why Your Channel Partners Are Your Biggest Liability (and How to Fix It)

If your partner in Munich mishandles customer data, or your reseller in Paris uses a "black box" AI tool to generate deceptive ads, it isn't just their reputation on the line. It's yours. With the EU AI Act now in full swing and GDPR entering its "mature enforcement" era, the distance between a partner's mistake and your company's $20 million fine has never been shorter.
EU data protection
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
fromComputerWeekly.com
1 month ago

RWS Global deploys Box's AI tools to streamline contract workflow | Computer Weekly

The end user types in the information that needs to go into a contract via Box Doc Gen, which is then sent over to Legal for approval. Once approved, the contract is sent out automatically and signed using Box Sign. The signed contract is then uploaded to the cloud. Given that RWS Global has contracts with thousands of performers, the automation of the contract approval workflow saves many hours in terms of manual processing.
Business intelligence
US politics
fromNextgov.com
1 month ago

Contract reviews continue at OMB, official says

OMB is leading a government-wide review to cull and reform IT contracts, emphasizing commodity IT and empowering CIOs in procurement and budgeting.
Artificial intelligence
fromFast Company
1 month ago

Do you really know what 'agent' means? If not, you're putting your company at risk

The term 'AI agent' has been stretched to include many different systems, creating confusion that distorts public debate and hinders enterprise adoption and strategy.
fromTalkNats.com
2 months ago

Just because you don't see it, that doesn't mean there isn't work being done to improve! | TalkNats.com

You must be a TalkNats Subscriber to access this content. Subscribers have access to exclusive content on the TalkNats website and can engage in discussions with other Nats fans. First two weeks are free and then you will be billed $3.99/month. Cancel anytime. Secure payments using Stripe. If you are already a subscriber, simply log in using the form below.
Washington Nationals
Information security
fromTechzine Global
1 month ago

When is an SBOM not an SBOM? CISA's Minimum Elements

CISA's new SBOM Minimum Elements establish baseline standards for software supply chain security, while EU regulations legally mandate SBOMs, creating a global baseline that organizations must meet to remain competitive.
fromEntrepreneur
2 months ago

How to Win Big With Public-Sector Partners

Understanding the difference in purpose Unlike private businesses, which exist to make a profit, public institutions are designed to create impact - especially social and economic outcomes that benefit everyone, not just paying customers. A public agency doesn't measure its success in revenue or margins, but in how much it improves lives, builds equity and maintains public trust. This doesn't mean budgets and spending don't matter - they absolutely do - but money is not the goal. It's the tool.
World politics
Data science
fromNextgov.com
1 month ago

FPDS looks old and clunky but that only masks its power

FPDS.gov retains a 1990s-era, clunky interface but remains a powerful, complex federal procurement data repository that requires skill to navigate.
US news
fromFast Company
1 month ago

What even is a 'low-hire, low-fire' environment?

The U.S. labor market shows low hiring and concentrated large layoffs, producing mixed signals of modest job gains alongside fewer available jobs and slower reemployment.
Higher education
fromPsychology Today
2 months ago

When and Why "Management" Became a Dirty Word

Managers are often devalued compared with celebrated 'leaders', prompting supervisors to pursue leader status despite many managers excelling in noble managerial work.
Marketing tech
fromMarTech
2 months ago

The $2 million martech procurement mistake hiding in plain sight | MarTech

Martech procurement must be a strategic operating decision, not ad-hoc shopping, to prevent fragmented stacks, fragile integrations, underused licenses, and wasted investment.
fromDaily Coffee News by Roast Magazine
2 months ago

Report: Sustainability Must Be Embedded Into Core Buying Practices to Drive Change

"Ironically, many if not most of these 'sustainability' projects remain disassociated from companies' core procurement strategies, meaning the coffee produced from these projects is not necessarily bought by the companies involved, or only in minimal quantities," the paper states. "And for the coffee that is purchased, prices do not factor into the project design, despite the fact that price is the single variable impacting farmer income that is in the direct control of companies."
Coffee
fromAbove the Law
2 months ago

What If Tariffs Go Away - Or Don't? How You Can Protect Your Bottom Line With Contract Intelligence - Above the Law

With the Supreme Court potentially poised to invalidate recent tariffs, organizations face a confusing scenario. Having clear visibility into contract terms - such as price adjustments and renegotiation provisions - is essential to navigating this volatility. Come join us on at 1 p.m. ET on Jan. 27 for this CLE-approved webinar, where we'll discuss the current state of the tariff conundrum and explore strategies for achieving contract visibility with the latest AI innovations.
Artificial intelligence
#gsa
Software development
fromDevOps.com
2 months ago

Survey Surfaces Disconnect Between DevOps Metrics and Business KPIs - DevOps.com

DevOps teams monitor applications extensively but rarely translate performance improvements into business metrics or formal financial impact measurements.
Productivity
fromdzone.com
2 months ago

Eliminating Reporting Noise in Agile Teams

Unstructured proliferation of reports creates cognitive overload, wastes time, and undermines Agile teams' clarity, decision-making, and delivery.
Careers
fromYourTango
2 months ago

CEO Says Most Workers Lose Respect For A Boss Who's Not Willing To Talk About This Once Taboo Thing

Workers prioritize pay transparency over flexibility; employers must adopt transparent salary practices to remain competitive amid widespread inflation-driven financial strain.
Business
fromEntrepreneur
2 months ago

Why 67% of Strategic Plans Fail to Deliver Results

Lack of institutional authority, not execution capability, prevents strategic plans from being implemented; embedded operators with decision-making power drive results.
Marketing
fromThe Drum
2 months ago

Can agencies pick up more business with a changed approach to procurement teams?

Agencies that proactively engage procurement teams can win more business by treating procurement as strategic partners rather than adversaries.
Law
fromBusline News
2 months ago

Dollars, Lawsuits & Culture: The Business Case For Relentless Inspections - Busline News

Relentless, disciplined vehicle inspections transform random mechanical failures into planned maintenance, reduce legal and regulatory risk, and protect profitability.
Tech industry
fromBusiness Matters
2 months ago

The Role of Legal Tech in Enhancing Transparency for In-House Counsel and External Firms

Legal technology, especially contract management and document automation, increases operational efficiency and transparency, improving communication and trust between in-house counsel and external law firms.
Artificial intelligence
fromBig Think
2 months ago

Three questions to ask about your AI partnership

Decide whether to prioritize rapid AI-generated learning products or preserve human-driven processes to maintain ownership, critical thinking, and long-term learning quality.
fromTechzine Global
1 month ago

Basware: SAP migrations fail due to Accounts Payable issues

The clock is ticking for companies using SAP ECC. The transition to S/4HANA must be completed by 2027. However, the reality is proving difficult. Figures from early February from research firm ISG show that nearly 60 percent of SAP migrations are delayed and exceed their budget. Underestimated complexity, scope expansion, and internal capacity constraints are identified as the main causes.
Software development
fromFortune
2 months ago

As risk skyrockets, current and former CFOs are in demand for audit committees | Fortune

As audit committees confront a rapidly expanding risk landscape, their role in corporate governance is being reshaped. Boards have often turned to current and former CFOs as independent directors, particularly for audit committees, because of their ability to translate complex operational and financial realities into effective oversight.For example, this month, J. Michael Hansen, former EVP and CFO of Cintas Corporation, was appointed to the audit committee at Paychex.
Business
Marketing
fromThe Drum
2 months ago

No admin fees, value-based models, guaranteed results: A new era of agency contracts

Agencies are shifting to value-based and performance-guaranteed commercial models as marketing budgets stagnate, increasing pressure to justify spend and deliver measurable ROI.
Law
fromBusiness Matters
1 month ago

How Unexpected Workplace Incidents Can Disrupt Business Continuity

Unexpected workplace incidents can quickly disrupt operations, creating legal liability, staffing strain, lost momentum, and eroded trust for small and mid-sized businesses.
fromFast Company
2 months ago

Why your AI project is about to get deprioritized (and how to save it)

Your AI pilot showed 94% accuracy improvements. The LLM is yielding solid results. You're getting defunded anyway. The reason? You solved a problem AI can solve. Your budget-holder needed you to solve theirs. Companies launch AI pilots that produce results, then stall at scale. The team's diagnosis: "They don't get it." What's really going on: These projects never earned budget-holder buy-in.
Artificial intelligence
Business
fromHarvard Business Review
2 months ago

Where to Look for Ethical Risk Inside a Company

Unchecked integrity gaps—overlooked conflicts of interest, offensive behavior, or aggressive sales practices—can escalate into severe reputational and financial harm.
Business
fromFast Company
2 months ago

Meet the chief resource officer

HR should oversee agentic AI as a team member, using human-centered design to manage workflows, employee experience, and culture for meaningful business impact.
fromSecurityWeek
1 month ago

Four Risks Boards Cannot Treat as Background Noise

Rather than stolen data making headlines, it was business stoppage that triggered attention. Moving into 2026, the board's focus should be on ensuring business continuity and building resilience in the face of emerging risks generated by AI usage and attack vectors, quantum computing and geopolitics.
Information security
Business
fromBusiness Matters
2 months ago

The ROI of Practice Automation: A Guide for Finance and Accounting Businesses

Automation eliminates repetitive administrative tasks in accounting firms, freeing time to serve clients, grow teams, and improve work-life balance.
Information security
fromSecuritymagazine
1 month ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
fromSecuritymagazine
1 month ago

Strategies for Security Leaders in the Midst of Skill Shortages

Organizations have reported heightened cybersecurity risks as a result of these skill shortages, but the issues don't end there. Many teams will also experience burnout, which is an issue for security teams even in the best of times, which can only add to the talent gap concern if burnt out employees leave the industry.
Information security
Information security
fromThe Hacker News
1 month ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
Information security
fromTheregister
1 month ago

Threat intelligence supply chain is full of weak links

China's ban on foreign security software threatens the global threat intelligence ecosystem by risking data fragmentation and weakening international cybersecurity collaboration.
Information security
fromTechzine Global
2 months ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
fromSecuritymagazine
2 months ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
Information security
fromSecuritymagazine
2 months ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
[ Load more ]