- Outsourcing Giant TELUS Digital Confirms Data Breach that Leaked Nearly a Petabyte - CPO Magazine— CPO Magazine
<a href="https://news.google.com/rss/articles/CBMixAFBVV95cUxOc19ZdGgyanpXcGdqRlpGMXFoQnJDMzZ1VWxaTkV3ZHZSNFlFSTNzR1I0NzBlbGhiSGNuTFNlMVB4VXNNUG1iS19Bd2l6dzVaRk44QWhrWG5paGNHc1VXS18yNy1mZWY2N3h0Yk1vWktoVlRlTHJ5UVNTTHZ1TUlsaHlTRk56UTI0bWlDNk9JWFlPSW1IZlc1UEdNSkZva0VDai0wa1dvWUlEZzVoNHQ3ODJ2T1FaemdxOGpuUTl2clpfdENv?oc=5" target="_blank">Outsourcing Giant TELUS Digital Confirms Data Breach that Leaked Nearly a Petabyte</a> <font color="#6f6f6f">CPO Magazine</font>
- Zacks Industry Outlook Features Capgemini and Adecco Group - Bitget— Bitget
<a href="https://news.google.com/rss/articles/CBMiY0FVX3lxTE9KcGNXdUFDYjN1SXdZdGJyTEZXczVJMUtycURmSHIwdlF2YXZuZl9YZERXUXZrQzdvMW1mUE9YbjZ4NktNMmlzblNUZElvc08tSmdpdXV6QkFuOWdDN1ppUVYtVdIBY0FVX3lxTE9KcGNXdUFDYjN1SXdZdGJyTEZXczVJMUtycURmSHIwdlF2YXZuZl9YZERXUXZrQzdvMW1mUE9YbjZ4NktNMmlzblNUZElvc08tSmdpdXV6QkFuOWdDN1ppUVYtVQ?oc=5" target="_blank">Zacks Industry Outlook Features Capgemini and Adecco Group</a> <font color="#6f6f6f">Bitget</font>
- Zacks Industry Outlook Highlights Capgemini and Adecco Group - TradingView— TradingView
<a href="https://news.google.com/rss/articles/CBMitwFBVV95cUxNVTd2NGZjdjBRQTZxcEZCRThXeGg1NjZvVVMtY2N6cXhjTGJXRXFYX0ZTS0tLR0NxZlBiY0NXVnIwMGtpT1NfYjduSllXVUVucEFLQUFVTVpwMEhBbV9ZRGZLSTkyVHItaEVzV1FUZ0x1d2FNcXd5LW55UU0zMmVicTJFMk9nZHJnQ21iLXNtd3RxYVN2d2lLNHdlcU5JT0RoUmEwQ0JaWHJvU1FhZ0x2QU9MLUFrVlE?oc=5" target="_blank">Zacks Industry Outlook Highlights Capgemini and Adecco Group</a> <font color="#6f6f6f">TradingView</font>
- Australia Managed Security Services Market: Safeguarding a $3.2 Billion Digital Future - vocal.media— vocal.media
<a href="https://news.google.com/rss/articles/CBMisAFBVV95cUxQUlhtRjNyUVNKdFBKMElxT1huV1BqUG5rd1lHckV0Z3N1dC1tMVhhd2RUeEFVWHlRN2M2VHZHbklsTTBvN3RuQW1rRE41d0ZQU2s3SENPWERXWmZBMnU1akdMZW5tTTR1THQtWUExd3dkbGYxYzZuWXY4LVM0aURnRUxvZVFHenhBWjRoWk1GcGNEVTNZV1ZCdmdzVzQ3b3lnU1AycDk0ZjliX05qWUE4Ng?oc=5" target="_blank">Australia Managed Security Services Market: Safeguarding a $3.2 Billion Digital Future</a> <font color="#6f6f6f">vocal.media</font>
- Philippines IT Services Market 2026: Growing Strongly Amid Cloud, Cybersecurity, and Outsourcing Trends - vocal.media— vocal.media
<a href="https://news.google.com/rss/articles/CBMixgFBVV95cUxQOE54blh6RWkwU2hST1V0Qi1YSE5WWTlaUE4wLVVOQkJSRXk5VFNhYTc3NXlkaXkydmtlZzQxMDFhb0ZhVElBNFcyWklJQVlPd2lRT0NoLWJ0eGxVT2o2MWlTVUtMd0VNT2lTV25MeW94MjJ3cTB5VW42VnFHNXF3eVdZVmpFcGt1MmZYanllVUx0V3ItTXpBOXpaaGE2OEV1UG50SGFwdC0wQ1k3UV9hS0J2ZUJ6MEk1REtPclZGSVZZdzJja3c?oc=5" target="_blank">Philippines IT Services Market 2026: Growing Strongly Amid Cloud, Cybersecurity, and Outsourcing Trends</a> <font color="#6f6f6f">vocal.media</font>
- Volvo Falls Victim of a Data Breach - Manufacturing.net— Manufacturing.net
<a href="https://news.google.com/rss/articles/CBMimAJBVV95cUxPV0JTNHBHZzFXSUtBQ2pDWEdfc3Jrdnh3VUhEeS1QamJ6MV9VZ0NTcjEwRWlGdm5XZEFWajJXRzBIdmpRNEtNREhMdy00eW1oS0d6T3E3ZV9KOU9kTjdWN1VZWjEyYTZTbjBOb29pdlUyQ3JIMUF2ZnVRNjdyY1ZxTlZTWk9BWWJQZkJ3R20xdEFyTkxTU1lWQ0hYM2VNRmNNNHF0MGx1eXQ5MjF2V1BoUVNyOUszNzRUN3pSU2ozMkhnY3NXeFQxRTEwNTctdjRKZkt0bFNhaXFFaDROSjNrZDZRYXNJaFNOUEFyTHRnQmJkMG9URElNNldrNGJENTZUSXZWdjlJSkh5UF81RU5qQlhycFQwTllK?oc=5" target="_blank">Volvo Falls Victim of a Data Breach</a> <font color="#6f6f6f">Manufacturing.net</font>
- 96% of Vietnamese firms plan to outsource cybersecurity operations - Báo VietNamNet— Báo VietNamNet
<a href="https://news.google.com/rss/articles/CBMipgFBVV95cUxORjdQeTRBXzMyTVE1Ni1LZHRzNHprYkRURVRvOWtwdk13OVU1eU1hNDVMYTlVSGcwUlluMVdwM0R3VFoyUjBvc0lOMUNxOXd6YWg2V09rRzRwU3FjaUJPQkUwMXFyQmhUdXU3QXZRLU9EbVRzOEY1bUJvMTdFQmp3Q3J1TGdkNHFnWWxSTDdPQ1BvMGJHMXFNREw0M1NtYzc1eWhoSVBR?oc=5" target="_blank">96% of Vietnamese firms plan to outsource cybersecurity operations</a> <font color="#6f6f6f">Báo VietNamNet</font>
- Nearly 96% of Vietnamese firms outsource cybersecurity operations: Kaspersky - Tuoi Tre News | The News Gateway to Vietnam— Tuoi Tre News | The News Gateway to Vietnam
<a href="https://news.google.com/rss/articles/CBMivgFBVV95cUxOSm5tMml0QTJnSUNMLUxSZkNNMUhWLXZuZmtKUXllNGExcjlIOG9YWXVmVlBESENQVkF4dG1mZjdwSXRVNWlfSlpSZDI5bko0RE1WdmNMdGJBT2NqaTZEZlNjMTBUakxWX3RDM3ZaZ3lGaXdUT1VOSjN0dmpKQXpiVWtqTGdwQUo4anJhNU1IdGhpY0xCZW9DU3NWVktya2lFbG5Qa3YyU0FKYmVzVDdIQTZwYldZSXAxdzNLY2FB?oc=5" target="_blank">Nearly 96% of Vietnamese firms outsource cybersecurity operations: Kaspersky</a> <font color="#6f6f6f">Tuoi Tre News | The News Gateway to Vietnam</font>
- Protect Your Business: Cybersecurity & IT Outsourcing for Small Businesses - NetNewsLedger— NetNewsLedger
<a href="https://news.google.com/rss/articles/CBMiswFBVV95cUxPa2VzdVZsNHpYTW5qMHdNTEZDeDRRbUZ1QWZ3eWZMUklxZUhlaGZwMXJKWVNGVTRIOVJ6TExlNnBYTVJmRE54cDJ5Z01QSVNSNW1mNTBicExOWE13cTBpWDFjNVVBaDh0R0JQdUZwZThGRHVYaUs0cXlHcUVYTkxKc2ZsXzBIaDNNaGVVS1IxU0R2VHBFMGhCNXQ4bzFEdlJ0ZmFxcnFvclNzYW5VR1BKN3pmdw?oc=5" target="_blank">Protect Your Business: Cybersecurity & IT Outsourcing for Small Businesses</a> <font color="#6f6f6f">NetNewsLedger</font>
- When it’s time to build a SOC, nearly 90% of organizations prefer outsourced or hybrid models - Kaspersky— Kaspersky
<a href="https://news.google.com/rss/articles/CBMi0wFBVV95cUxORlQ0X1ZIWVozNFAtQkRrVVVaQlJlandTRmtzMXgzcm90VXU4RVljdS0tMnNwTDZ1VlN6cmdoR2xoSnhBdzg0TG9QM0dqUThEd3V5Q2djdGlYOTFTcTNuYlc2TERTUnpLRF9nMlhXQXh5T0M1RUlLdmZfbEVySDV4OEZxVHVuZ29ZSUZLOVlPdDZ6YzFwNkJQYzhIS3VhOXNqdjZ4WjczU3dQWjhlMkVDTXFkNFMzUWJnOVRXNmcyaHBnZFRJSmROSFNpLTh3ZEZVbmsw?oc=5" target="_blank">When it’s time to build a SOC, nearly 90% of organizations prefer outsourced or hybrid models</a> <font color="#6f6f6f">Kaspersky</font>
- Executives say cybersecurity has outgrown the IT department - Help Net Security— Help Net Security
<a href="https://news.google.com/rss/articles/CBMimAFBVV95cUxPNW1PcEJRNHdqaU5BcVRFVmp6ZGdzVDNwNnlKWjkwV0FVa1JpYmxnM3dpR2twUG0xaXo5VFktaHRCVkRsLW5OWFYtSklGOEt5UVVqRnpyRnlFeGVzV3JDWDZuZ1AyWTc3cTdKVG1zbnZmbGJRMzJkNDJPSnZILWlDUU80VHltdTBEdFdMT1V5ZFJGaUNoVS12VQ?oc=5" target="_blank">Executives say cybersecurity has outgrown the IT department</a> <font color="#6f6f6f">Help Net Security</font>
- Why outsourced cyber defenses create systemic risks - csoonline.com— csoonline.com
<a href="https://news.google.com/rss/articles/CBMinwFBVV95cUxOeVpzUG9wSjdaWnNnQXhnX1ZhcmpzTHplQnZQRUxqZUZrOFZCaDZnNk5vQUFoNl8td2FXeTBKZklUQmlzT2pva3R5dkJpZkotU010NGZsejNMcjJfSFZKTkUxR1RpdnVnRF82amVVNkVpd2JDSGNOR0tBeTlNZ0lUSWJ5MU15bEFQNzBZdFFsdGgtVzRQdmlrc0UweUNyUWs?oc=5" target="_blank">Why outsourced cyber defenses create systemic risks</a> <font color="#6f6f6f">csoonline.com</font>
- A&M’S 2025 Cybersecurity Market Study - Alvarez & Marsal— Alvarez & Marsal
<a href="https://news.google.com/rss/articles/CBMihgFBVV95cUxQTVhnSnJqZjB3NldKMTVaVVRqVDkzdW5Ua3NhR1ExTHJ2Z0RVcHVTOEUzMkRKTUNyTWlrRFZVNTBmRnlwTjFGT2JaeU5CRUtCc3UyRFZfaF80el9uLUZjeVFqa2dSbXkxQjNQZlRRVjc5VS1jX2xIZmJGaGRNOG5xTnJZa3pKZw?oc=5" target="_blank">A&M’S 2025 Cybersecurity Market Study</a> <font color="#6f6f6f">Alvarez & Marsal</font>
- Healthcare turns to managed security to guard patient records - IT Brief Australia— IT Brief Australia
<a href="https://news.google.com/rss/articles/CBMilAFBVV95cUxNM3MxUXVPeVpMVko5aG16a1hlSnJmbm9KRXpqRFRtZ2l5alZiQlF5TXZ1cVhldTlkclZfYjRMZ2pFZHpYZk1pZzM4a2p1NFZocm0wT0M3Vmc1S0RvUXdKTGdFMFNSSEtpcFVtWWN6cExoTEViOHlUcGt5QWl2Ni1EeXU3NEJhTUxiRUxzMWxYRkZnWU84?oc=5" target="_blank">Healthcare turns to managed security to guard patient records</a> <font color="#6f6f6f">IT Brief Australia</font>
- The Trends Shaping IT Outsourcing for Enhanced Productivity within the Digital Workplace - Fujifilm [Global]— Fujifilm [Global]
<a href="https://news.google.com/rss/articles/CBMi4gFBVV95cUxNbEZHTlRnSmtUU1lTZ2U0REFkMElWc0JTT3lvbXhEWG1UR3hNRml2TENpUTlvS3Z2UTdPT09mVDg1STNUSlpWUmFlLU53T1ROSElWd0J0X01IWGlyN2Z3SFktWHhnMzF6Rmpld3RHSUg5ZEg5UXh6aTBHVkxFNEZlWlQycjBXVnNnZnVyYnFZVXYzOFY2UVJsNWlhQXdKemlKV3ZYMUl6YU9jdDBrdWxvdVlsczdfZEFpQUxQT2I5T1l3NURqMUxkUURDVzBIWGhvT05LX1BUM2I1SU9nR2NaR1R3?oc=5" target="_blank">The Trends Shaping IT Outsourcing for Enhanced Productivity within the Digital Workplace</a> <font color="#6f6f6f">Fujifilm [Global]</font>
- Outsourcing strategies for multifamily offices - RSM US— RSM US
<a href="https://news.google.com/rss/articles/CBMipwFBVV95cUxPeXB0MnE4dFQxVjJHcVZSMmZwNjB2dHhjck9HTlBydVRnaFNYYnNzUXJ3ZUJTZmROazFGdFhIQTZ6NFpDTHhxRUszcU80U2ZXSlRGWUNDVkVhb3NrM2JWWW1wYzlOelFyN3Q0eVhETExScGJ4QUtnRmwtQjhNbXMxbVZ2TUpnWUx5SFE0b2F5RmVnYWhIZnNSamxLT3dqMm5IbkpmYnBNNA?oc=5" target="_blank">Outsourcing strategies for multifamily offices</a> <font color="#6f6f6f">RSM US</font>
- Capita fined £14m for cyber-attack which affected millions - BBC— BBC
<a href="https://news.google.com/rss/articles/CBMiWkFVX3lxTE9EUGxIZUd3TTRDeGdRYVo2RzVrWXpMTUpXSVYwbnAyR3hDNEVjTVpEczJrSVZkYjJObk56Zm5UVkVHcEhSMXFiaVNLd0xKVjB4alo5bVVtcGNsdw?oc=5" target="_blank">Capita fined £14m for cyber-attack which affected millions</a> <font color="#6f6f6f">BBC</font>
- When private cybersecurity outsourcing costs us all - Computing UK— Computing UK
<a href="https://news.google.com/rss/articles/CBMimAFBVV95cUxQclozektLYk9mNHZXamgtRlJ3YW1MbWQtSjFfOFE1WDRLTHBsMUowUUx1Ylh4MWV6azUwMEI3Uy1ZS3p4LVF4S2phdFVZd0Z0TEVucTRHeWgtc3M1Tzg1MUNMYldHU1NmT3dnSHV6a0YybkFnenYtcjVUQVd4S0FIeDJGMEFKeEkwQ3loUXdSMXZZUVhmZTBHXw?oc=5" target="_blank">When private cybersecurity outsourcing costs us all</a> <font color="#6f6f6f">Computing UK</font>
- JLR, M&S and Co-op: Who is TCS and what is causing the cyber attacks? - Insider Media Ltd— Insider Media Ltd
<a href="https://news.google.com/rss/articles/CBMipAFBVV95cUxPYmxQVjN6MEw0MFVfQm1hNS0ydlFnMXFEb0NJck9zallMdG9rbFRQUkZUZ2NMbGpXc0NQMVAwMzJJMUpYQzUyQlhOOGNZTVRBQm44b2RRNlhzSkhDYm9rS2w2eXhPdXp2bzJvQl9ZY21zLUd6dmt2R25UX0tSZDhQUkFjUW1pWU4tVEhMZ1ZUaUxqUG9fdW5XeUhyenc4UUtvRGtISw?oc=5" target="_blank">JLR, M&S and Co-op: Who is TCS and what is causing the cyber attacks?</a> <font color="#6f6f6f">Insider Media Ltd</font>
- Inside the Jaguar Land Rover hack: stalled smart factories, outsourced cybersecurity and supply chain woes - The Guardian— The Guardian
<a href="https://news.google.com/rss/articles/CBMioAFBVV95cUxNZGtwNkdXb0tpZWJuZjV6Yjh1bFZnck14Rm14Vi04eWxINWk2bTU5d0NCaGZvckhyX2MxaXRrWGJKelZuZGdPMGtSMHJ2NEFibWdXc25aQVU1dU5UbGxNUE5UMG1GTGMtNXNKV242dkVrV1lneDlZbmQ3TGQxSUdzWW1rLUVvMTlzSHJYS3hNZ0xaTnVHY0U5VEVvbUJ3bjBF?oc=5" target="_blank">Inside the Jaguar Land Rover hack: stalled smart factories, outsourced cybersecurity and supply chain woes</a> <font color="#6f6f6f">The Guardian</font>
- Accenture acquires IAMConcepts to expand Canadian cybersecurity - Outsource Accelerator— Outsource Accelerator
<a href="https://news.google.com/rss/articles/CBMieEFVX3lxTFBtOUlpVHlPS0Y3VXBiN3JDakNWbUpFY0RwQnBaeGo4akg0UUl1ZVNQTW9LQzU4SWNwQkViYWFvYmVhMnBRVGpxdi1rYkNxWnRWbHZjQUt5dDlYLW5jc0E4a09BUWVyZXhMRzJGX2R3c3QzcXNPWDJSWg?oc=5" target="_blank">Accenture acquires IAMConcepts to expand Canadian cybersecurity</a> <font color="#6f6f6f">Outsource Accelerator</font>
- The Elephant in The Biz: outsourcing of critical IT and cybersecurity functions risks UK economic security - DoublePulsar— DoublePulsar
<a href="https://news.google.com/rss/articles/CBMizwFBVV95cUxNZzN1MmpsdU9zMEJDQ2xPT0VWbXI2LThVdm1wbHJ0WUY4dUZuOVNFQWxGRTdfTFZLd1R2cjhoZXNoSmp3MnV1ZVlrMVdKaG9DbG03UVBhNXdrVWFaa1JUWnZxT2ZTMXNDYUhUektNcDhzUWlaYUMtMl9UZk5NQ3hRaUlBSHR6Qm5rUFJETTliSWxKeDFEbEU3U0pkU1llWExIVDZ5NGppdDBkMUdiNjdpVC02Uk9UM0hqTkMwZ2Fma3E3NkJ0eWwzRHBFandrQVU?oc=5" target="_blank">The Elephant in The Biz: outsourcing of critical IT and cybersecurity functions risks UK economic security</a> <font color="#6f6f6f">DoublePulsar</font>
- Wipro adds Simbian AI agent to managed cybersecurity services - Outsource Accelerator— Outsource Accelerator
<a href="https://news.google.com/rss/articles/CBMiWkFVX3lxTE5wbzlxMlVmUkpuQS1CanhXeWRLclpac2NvOVRfdzc2VzU5QjNhZWNQOGxoQVcycUJVVWlnTWlkQ1dVakFaQjlLQWJ5dFFsLTd0SmJvNmYyazlaQQ?oc=5" target="_blank">Wipro adds Simbian AI agent to managed cybersecurity services</a> <font color="#6f6f6f">Outsource Accelerator</font>
- Deloitte and Datamount partner to advance cybersecurity capabilities in Oman - Consultancy-me.com— Consultancy-me.com
<a href="https://news.google.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?oc=5" target="_blank">Deloitte and Datamount partner to advance cybersecurity capabilities in Oman</a> <font color="#6f6f6f">Consultancy-me.com</font>
- You can't outsource risk, warns Brennan's cyber chief - iTnews— iTnews
<a href="https://news.google.com/rss/articles/CBMilgFBVV95cUxOU3JKR1A2VFFJMS10OENzWnNGSlpmbFlxYnQxelVIbG9UY21xRC1uTk9PcTEwTHdlMUU1TWhOcjlWZUtNc1lRd2hwU2tZZ1lWMFhzMUdCdnNPdllheW5PZlZzR204UHd1U3JRNmZXVmNIZWhnaFhGVzZfODBRdU9UN0lHZk5VTTU3Y0FoM1JRQ0NOQXhjc2c?oc=5" target="_blank">You can't outsource risk, warns Brennan's cyber chief</a> <font color="#6f6f6f">iTnews</font>
- Accenture to acquire CyberCX in $650Mn cybersecurity deal - Outsource Accelerator— Outsource Accelerator
<a href="https://news.google.com/rss/articles/CBMiWkFVX3lxTFB3dkotWHBvckJETnRXR0VEQ0Z6cFN6c21lbW51aHlnbTFVejU2M2Z1Q19valhBb2tWRFFseVp6RVlOdEVTTmRicWxMSHRBaWpwektwNlRINEpRQQ?oc=5" target="_blank">Accenture to acquire CyberCX in $650Mn cybersecurity deal</a> <font color="#6f6f6f">Outsource Accelerator</font>
- Why outsourcing cybersecurity is rising in the Adriatic region - Help Net Security— Help Net Security
<a href="https://news.google.com/rss/articles/CBMisAFBVV95cUxPYmV5NzZCdzdvdkw1STAxcXZ0aWxhOWNsZ0NQOHptUTZDb0NNZU1ncEJmdXZFX0ZHcTI2RlV0VWtkY1pMemFQX0VMZEUtNW1kUlNWeVVPMU0xOEJJNEtWRWFyQ1BQeFVwOHlqdXdHbjZDcW1QQ1RpY3R1QWVNNFJBcmZUZFpxTVdsQktWa3dEUHNOWFVZUThQQlFMclJSbjV5ek9wdF9OTzBEUC04elJVeQ?oc=5" target="_blank">Why outsourcing cybersecurity is rising in the Adriatic region</a> <font color="#6f6f6f">Help Net Security</font>
- Private sector calls for stronger safeguards in Konektadong Pinoy Bill - Philippine News Agency— Philippine News Agency
<a href="https://news.google.com/rss/articles/CBMiUEFVX3lxTE1nemJZbzNsbVRNdWlFU2prQ1lXLUNwYUhOTTBGYndya216UXZKdVRxdl9wRUlFUFlEazdQdjhlME5Gc0Z1N3JvLWY0dmRuMFg1?oc=5" target="_blank">Private sector calls for stronger safeguards in Konektadong Pinoy Bill</a> <font color="#6f6f6f">Philippine News Agency</font>
- Thrive Acquires GRC-Focused Abacode - GlobeNewswire— GlobeNewswire
<a href="https://news.google.com/rss/articles/CBMiqwFBVV95cUxQUkluUWI3RHFyUk5fZzUxSk5xc01Uc3dnQ2xuZnVXUERHVXNMUndPeDZhSm93X0VqVXlOd0QxNU0tSXZ6TXZycC1TcmZ0dWVhQkRkS0N5bzdKcVF4Z2ZnQUJldDlYT3BFYVFIYmpPS1FKaHNmYTAxQTlaZXc0aV9KR2JvUFJibzNGZmtiOVlFNmZqenhzZEhkSmVYZVJmUVpVNXZTOFlPQzZTeHM?oc=5" target="_blank">Thrive Acquires GRC-Focused Abacode</a> <font color="#6f6f6f">GlobeNewswire</font>
- Cybersecurity Outsourcing: Strategies, Benefits and Risks - TechTarget— TechTarget
<a href="https://news.google.com/rss/articles/CBMipAFBVV95cUxNT3dkclVkNTZwazBYeDJ1YnI0RTRTU3RSVkduYVRGTy16VVNWR0t1bDd6NmpiSUNUQTV1ektHUXU1V3VXNTlfc3lGMHVJRWtkYWg0eXdOZFZGZmJLX1lyX21vZUJTZ1lsbHQxMkgxWV93TEpjSDB4Z29FMmdnYmxQdVExSkNUd0lCWHp0N2RELWRmcXpHc0N4RENNZnBfcVE2NTdWWg?oc=5" target="_blank">Cybersecurity Outsourcing: Strategies, Benefits and Risks</a> <font color="#6f6f6f">TechTarget</font>
- MSSP Market Trends: Cybersecurity Outsourcing & Managed Firewall Services 2025 - MarketsandMarkets— MarketsandMarkets
<a href="https://news.google.com/rss/articles/CBMiqgFBVV95cUxQOERRTmxDTFhzRlRIUnZUdjJlUTVhUVdTaDJYeldYTG1rb01WcnBwUlg0bDNna3JGcGs3T01LRzVwUEhJTmI0N3VQS29HcEExV2dQTk5YakZ2N0pfTHVjZ3FQRlBRc3lqV1E2ZzQwdnFEMUZielJraUNYRHNXX1lmcmZZMG13M2ozb0wtc291a0s4X0o1XzJSTVZUWWJ0RUlJNEowUUtzLTY0QQ?oc=5" target="_blank">MSSP Market Trends: Cybersecurity Outsourcing & Managed Firewall Services 2025</a> <font color="#6f6f6f">MarketsandMarkets</font>
- Why Supply Chains Are on Collision Course with Cybercrime - Supply & Demand Chain Executive— Supply & Demand Chain Executive
<a href="https://news.google.com/rss/articles/CBMi0AFBVV95cUxQZHhBZkNvUmg5cW5IMWZWanRVRXdLSmZRS2YzaFdEVm5YT0c3cFVvYk94UVJWUkxrRGVSbklVUVAzQk8xdkoyODdOcm9iSW9SSXNzcXQxRGtZM0VTMEVTd3k5aEVyYU5yUnUwUjBDLU1pczBqNWlwMzJldVhfRlBIWDBNQ1g2UDdEX3ZnMkVYbWNrTVNkbXpxVEFJbF84WEVQaWRva3ZudUFVcGhmQll6S0EyNHBzMU9jSUFEdTI1Wi1vak9wMlF3Wk5wU3JVRzJX?oc=5" target="_blank">Why Supply Chains Are on Collision Course with Cybercrime</a> <font color="#6f6f6f">Supply & Demand Chain Executive</font>
- Concentrix debuts AI-powered managed cybersecurity service - Outsource Accelerator— Outsource Accelerator
<a href="https://news.google.com/rss/articles/CBMiWkFVX3lxTE1oYWcxNXRDNzJNRGZmM21UTTYxZXo3Y290WlFlbTFFdTBzaFVwQzd6S2c4LTJmeGprU0ZCeGswSDhkRzIwdC15NldCazV4RW9hSFNOcGxyZHpsQQ?oc=5" target="_blank">Concentrix debuts AI-powered managed cybersecurity service</a> <font color="#6f6f6f">Outsource Accelerator</font>
- How outsourcing and automation plug the cybersecurity skills gap - SecurityBrief Australia— SecurityBrief Australia
<a href="https://news.google.com/rss/articles/CBMioAFBVV95cUxQUEZSYVJfZTM3dnZrTGZnaGtvRzNzTlplX0t5U2lqNVFMQzBCMS1kckVSLXRiLTlNUjJuRmZFMWtsZDVpUFdnR2t5ZXNMY251dDM2MmhKVGE1Nm5pcHd0cjFQeExNMTRLTDdpbjJ2MndfRkUxVzhoZFViZWx5WUZnMVJMX3F0cnBmTTd1bHlzTy14LUlSOVUzbi1CTko2N0FO?oc=5" target="_blank">How outsourcing and automation plug the cybersecurity skills gap</a> <font color="#6f6f6f">SecurityBrief Australia</font>
- 10th Annual Cybersecurity Special Report by RSM US Details Sophisticated Threat Environment, Highlighting Progress and Risk Mitigation Opportunities - RSM US— RSM US
<a href="https://news.google.com/rss/articles/CBMikgJBVV95cUxNYlM2NzZIZXpwMU9aQ2pFaXc4UnBzTnIwQ1g2RnE0MFlOUTZPcXJNUjFmX1hYUWVHTXdIUzhJV0pWMkp5dV9sa2p6MWY1UGtQT1RKX1pSV2NEanpmdmtRVkFiMkRldE4xYUQ1Rm5DY0gwQ1ZRSG5kbFExOVpMMHctMi10aDAwMFM4OUs3ZkwxYkllZmc1endKMWVMdnZEam1jYkc4YmUyeWVvcUxvQkdZU0ZJMnJaeEFuSy1KMHluVXRqeVIwMkpxcHRVdHkwb1gxRzk3RUMwbTE2TWJRSVBPemlsRU0tajNORlI0cWhSWF9ETHhrZXpQZlZPZnRVMXUwSnk5OFJlNXRqSFJVbXMxRDJn?oc=5" target="_blank">10th Annual Cybersecurity Special Report by RSM US Details Sophisticated Threat Environment, Highlighting Progress and Risk Mitigation Opportunities</a> <font color="#6f6f6f">RSM US</font>
- Cybersecurity job market faces disruptions: Hiring declines in key roles amid automation and outsourcing - SC Media— SC Media
<a href="https://news.google.com/rss/articles/CBMi0gFBVV95cUxOODZ6WWczQ2FkM0xwb1hOV3pQYUJ2OWFibVNXeWp6N3JEd1FjdENPa0tqaDhCeDVPWjBxU3U2X3BjZEJUNWNjWHMwNTMtemhpOG1kSllIVy05T2NSUWRpSVB5MHNkNEx0aE9GbXVqQzlFWW9mMWp2ZjBNQ19nSnVzbmFva1VTZURIbzhSYS02NUhKd0cwVVdrWUpLbThvR3dvV1oxXzU3TS1oSUdGUFFNMGxOOFhzaGZ5Tzllc3ZiVXJpUG41dnhvZlFwWnFGem9LdlE?oc=5" target="_blank">Cybersecurity job market faces disruptions: Hiring declines in key roles amid automation and outsourcing</a> <font color="#6f6f6f">SC Media</font>
- Lawmaker Fedienko proposes outsourcing the issue of cyber defense from the state: "In five years, the parliament has not understood what cybersecurity is" - Dev.ua— Dev.ua
<a href="https://news.google.com/rss/articles/CBMigwJBVV95cUxQWEhKTEtVbENuT0RZaUMtUkxBUHp2M1B2Y096SjFNOTZSczFEOGZ5cFBRYU93U3hvVnYyWWNINlJvSkI3U2VVY2dqdl9GTUVaOGZEbTRsNE9HU3hUZ1ZBeHF3cFBVVTkxT0U2YjhQamlITWFmRUZSZ18ySWozUUlzV01sRWRZV3RZanZWY0k2UExfcDd5LURMczlDS0ozaWtsaS0wSDRYYlI4ZWNPQ2NPaW4wbUg4c0NGTVpzVEI5NDd4MS1ucG9zT2VBWmZXNVQzMF8tenZ5aGlERTk0S2JBdTJQNWJUQ24wRXBoRlBBV3Y2VmtOMUNpYTJYY2xCY1pTY1RJ?oc=5" target="_blank">Lawmaker Fedienko proposes outsourcing the issue of cyber defense from the state: "In five years, the parliament has not understood what cybersecurity is"</a> <font color="#6f6f6f">Dev.ua</font>
- The Case for Managed Security Services in Healthcare: Reducing Risk and Enhancing Patient Care | perspective - MSSP Alert— MSSP Alert
<a href="https://news.google.com/rss/articles/CBMiywFBVV95cUxQSkREVlVWdmhRdWlVeTExWkRGeXByTDZEQVNNOVA3UG9FY0lGeXJtdkFLbXJVbkxGQmh6ZUx2b1NodjdBNktmclpvb21rdGhrN21XZVdPM0p3N3YzbTRuUU9FNkNJaDRmcDdXRnVqRTNNVEN6OWtfMmFoNGdXMnItQlR1YU1FV0hfcmR3QlprVEFvQm5DWmhIWHV4M3NjOEU1VnhBRExFM2Z6dVBRV2pqbW9sZXR1OU5Qd2NQTlJheHdJR3lXaDRhOEp6MA?oc=5" target="_blank">The Case for Managed Security Services in Healthcare: Reducing Risk and Enhancing Patient Care | perspective</a> <font color="#6f6f6f">MSSP Alert</font>
- Outsourced XDR security: Why it’s the right choice for Mizar Tech - Barracuda Networks Blog— Barracuda Networks Blog
<a href="https://news.google.com/rss/articles/CBMiowFBVV95cUxQMjJONkttZzlVd2RQU2VRczItR2VHVkRIZjY2N1NBYXJCZ3hraERvSUFGNnhHRmVucmpQaWNGSm5yNmxIOTdzNDBDRVliR3FOX0t0bWhsQUJlZ3ZVbXBoRmxjOWhrN0xNai1CWHJMZDlIZm9uaTZ3VzZSWmg3MUMyVWx6cXdTM2MxcnlqbkQ1YXJEWFJKSmd3bjR6QU55YnFNamtn?oc=5" target="_blank">Outsourced XDR security: Why it’s the right choice for Mizar Tech</a> <font color="#6f6f6f">Barracuda Networks Blog</font>
- How Exposed to Cyber Risks are Insurance Supply Chains? - Supply Chain Digital Magazine— Supply Chain Digital Magazine
<a href="https://news.google.com/rss/articles/CBMipAFBVV95cUxQYVV6WDhSZEx3M2xSWGtkcXd2QVpVLTVRWFVrcnV0TTM0V05TVnNNMHY3ZmwyYUJoeWg3ZGFmcXVNZDVXNjFWNVJmUnJQcUtLS3NkYXBRdEdTRl9jN3pGdDRYVmJhUS1mMWhwZDhPa1dIM1A1MWhmdjJ1LW5hT0ZIS2szcHdjR1NuOGNhYVB6TGNILVpDdFZIYy1qM2xrTE9UYTNXLQ?oc=5" target="_blank">How Exposed to Cyber Risks are Insurance Supply Chains?</a> <font color="#6f6f6f">Supply Chain Digital Magazine</font>
- The Cybersecurity Crisis: Companies Can’t Fill Roles, Workers Shut Out - Forbes— Forbes
<a href="https://news.google.com/rss/articles/CBMiuwFBVV95cUxPTGp0emlBVExqbzJtU29mc2UxOWYzWHVyS3FFY1BjbHZyT3B4M1FVTkdwRTVUNnRHeXNJZWZVdWNJS2ExRFZzRHotcUZ6WXZwenc5UFBIM1Z5Q3Z2VnFSZERzSm92NmM4cEV5dGhYZ2tnRUI0OE5Zcko4WWhXdm8tWl9tbXg3cEdseWdDNEp1WWt6Z19sbHZiNTBYMlJNUHd3d1dCTWlTdVJEQ0hCU0I3bEpIWVI2anpEUXFn?oc=5" target="_blank">The Cybersecurity Crisis: Companies Can’t Fill Roles, Workers Shut Out</a> <font color="#6f6f6f">Forbes</font>
- Government contractor strengthens compliance and cybersecurity by outsourcing - RSM US— RSM US
<a href="https://news.google.com/rss/articles/CBMi0AFBVV95cUxPVm5DU1FXaXNkVlctWWJIMFVKU3RVUFhFLUtTeEhxT1B0RDY4SFFjRHZDMDRQZXU1cEpxZGtmaFNPNGJSSnk3VVFRbFFRLXQwNG1nWXYzVlNZZWlscFE1bDNZRFlZcVBjVkNMY3NaVmxkUTBxQ1BkcFp6NmxnRk91dmp4NTBjZEhHVkxfMGtmRXd3ZlN5RHItcGZMbGdSeEFrcjUxem5mYV80X2d2UV8tcWpPUzBVcU12ZEdjNk9TVC05UnNHQU1aZU9XeUhfc3hO?oc=5" target="_blank">Government contractor strengthens compliance and cybersecurity by outsourcing</a> <font color="#6f6f6f">RSM US</font>
- Leveraging AI and Cybersecurity to Improve Operational Efficiency in 2025 - Medical Product Outsourcing— Medical Product Outsourcing
<a href="https://news.google.com/rss/articles/CBMirgFBVV95cUxNaVpRVm9pZGZRb2ZuNTlpWEk5VWZ1d1RPRmU3NW85T2U1N05RRWpOdkYyQ3dhTW8tVUsxamdLNjRJWEdVWDJvYzczcHo5bXh0N2tZUVBPaFNQLWZZQlQwWHdtYjMta2E5RWppUWJBUkJvaXJKSnpIdWhfaTJKQXk5dWVFQjJRLV9teTR4VUtmeXd5X0dkN0VuUWVoTEl3Umg2R2UxTDBRNnR6NTlDRkE?oc=5" target="_blank">Leveraging AI and Cybersecurity to Improve Operational Efficiency in 2025</a> <font color="#6f6f6f">Medical Product Outsourcing</font>
- Cybersecurity Lags in Middle East Business Development - Dark Reading— Dark Reading
<a href="https://news.google.com/rss/articles/CBMipgFBVV95cUxNYWJhRGVNZzhkT096VVlHQTJQSXp1YnRxTmt2RWU3YkkxdVNHS1IwXy1sQTdxVkl1ODlnNkdaOTdzRXdTRzZjWFFMSjlUbTRBdDRwVGlZdXFhTzduZ2d3WXg0bzdKMFhfb2VLNEhOMG9NWVU5RnBPd2VKWWJNZ18zZWhQdEpkZVNtVTN1RHhlUTFPU2tYT3JWUGk5WWhab1J5clZWcUNB?oc=5" target="_blank">Cybersecurity Lags in Middle East Business Development</a> <font color="#6f6f6f">Dark Reading</font>
- Yahoo cybersecurity team laid off, outsourced by new CTO - Outsource Accelerator— Outsource Accelerator
<a href="https://news.google.com/rss/articles/CBMifEFVX3lxTE10TlNDZHpValVoeXRpZ2JrMEhKNTVKWTB1dS1rZzU0YTNpeVBaOGdGdDRCTUFoMUQwWlNkTHZRNUlpWGZWLW96WGtlT1NIcDF5d1RHUC16OVVSTy1ZNmxBcmlIV0RHTGtZLUo0c2tNMXJqZDNCMmpuLXlva0I?oc=5" target="_blank">Yahoo cybersecurity team laid off, outsourced by new CTO</a> <font color="#6f6f6f">Outsource Accelerator</font>
- Yahoo cybersecurity team sees layoffs, outsourcing of 'red team,' under new CTO - Yahoo Finance UK— Yahoo Finance UK
<a href="https://news.google.com/rss/articles/CBMijwFBVV95cUxQQWZtNUVLY0VOd3d4U1RlT3pYY1JYazhBeTVRVU55Y1V3TFFsY1NYNUkzNnM4VDNyNmVwUEZFUmZlZkp6bWZuNVl4YTVKbW5GRHV5RWdZeUNjTWJjOGVTUF85NHJXU19WT0Z5dUhrSnNhSDVITm1nYjZaSFZoVHZfaUtPSXc1YmtRRlF5a2FnTQ?oc=5" target="_blank">Yahoo cybersecurity team sees layoffs, outsourcing of 'red team,' under new CTO</a> <font color="#6f6f6f">Yahoo Finance UK</font>
- Outsourcing Statistics By Marketing, Cybersecurity, Cost Saving, Benefits, Regions, Finance And Accounting - coolest-gadgets.com— coolest-gadgets.com
<a href="https://news.google.com/rss/articles/CBMiYEFVX3lxTE5UMURKRl9iRTV3Q3JjNFNQbEZXbTFqM2g3Z2s0ZXZJRDgxTWRpVjdmdWpuNnVPOTU5a3Fab1haWFdvNU13Z1hzR3FTc1pSOWxvOWpMTDdRMTFkWFg0azZGQg?oc=5" target="_blank">Outsourcing Statistics By Marketing, Cybersecurity, Cost Saving, Benefits, Regions, Finance And Accounting</a> <font color="#6f6f6f">coolest-gadgets.com</font>
- Logpoint finds skills gaps fuelling security outsourcing - IT Europa— IT Europa
<a href="https://news.google.com/rss/articles/CBMijwFBVV95cUxNZGpqekUxYkhicFVTb2o3Mm5FME53Q2czNDRENXd1QUMtRGV2bGFLNjh5T3UyWjdLTVoxZzduaXBJQ2VYQ1NyakxEV2QzY0JPcGt2VG1VMkNqRTJzTHQtWmNQTDRzVXRZdll2MDZmZHpOazJGdXF2b3dFdF9zeUk0ZF9DWjNjLVFzMC1USktFUQ?oc=5" target="_blank">Logpoint finds skills gaps fuelling security outsourcing</a> <font color="#6f6f6f">IT Europa</font>
- UK businesses increasingly outsourcing cybersecurity - SecurityBrief UK— SecurityBrief UK
<a href="https://news.google.com/rss/articles/CBMijwFBVV95cUxOUUVmd1pZcEE1VVYtT0RpcGVqOXBxSEgwQ080UlgwYlRWZnc3aldSRTJCaGJLaHFocHJnSlJob0RVMEt6emktOVJrRUFBOUFmN1RCUUZ6UmFWOVhPcGV0WDl3MEE5clZaMXBkVHNjdXIyVjZzdXNvNVdiSXVVeEZDcThKQ1YxUlBMT1dkX2Q2SQ?oc=5" target="_blank">UK businesses increasingly outsourcing cybersecurity</a> <font color="#6f6f6f">SecurityBrief UK</font>
- Ethics in cybersecurity: Building trust in the digital era - Fast Company— Fast Company
<a href="https://news.google.com/rss/articles/CBMimgFBVV95cUxOV0tzSHZpSG1HR2g2Tm15QWo0RHNHd0dxSDlkVk4xVFBXSzR6bUxMa2dGZzZIVmRNSkFwUXd5QUhXLTk1elV6S3FmWXBaYVVrZV8xRkxuZnlaWkxYNm0zel9yb2FFa3EwUG0xRm84UnhaM3ZJUDFsa3I3TU1kNUlyRU9DS0Y0UFZsRFR5OUZydkQzUnZtOUZrX21R?oc=5" target="_blank">Ethics in cybersecurity: Building trust in the digital era</a> <font color="#6f6f6f">Fast Company</font>
- Australian health insurer defends IT outsourcing amid job losses, cybersecurity concerns - Outsource Accelerator— Outsource Accelerator
<a href="https://news.google.com/rss/articles/CBMijAFBVV95cUxOeVktUTNZdEZOYTdSZjFac1lvOEMwMDJMeDNpbDY3UG5nMjNrWHc3aWZudUxLWllsN1dwUlh2ZkM0MUZaZTFONnZlbFVIQVJldVVrdzBjalA1c2ltZ1lGbTRVbFAwbUVJNEtYQkdNWEYzZWtWdU4zMkRzdjBpTTA4YlhSdFBWYTJrQU5ZOQ?oc=5" target="_blank">Australian health insurer defends IT outsourcing amid job losses, cybersecurity concerns</a> <font color="#6f6f6f">Outsource Accelerator</font>
- Obligations of insurers related to cybersecurity and outsourcing - fanews.co.za— fanews.co.za
<a href="https://news.google.com/rss/articles/CBMizgFBVV95cUxOM0xobm1OMlhmTk5UYVFzZVpMeVJBbW8zXzlkOW41OEZrSTQzU3ZuZERVeVc1TGN3MjlPck8zUGltT1JkWkUzdWNmcHVzVzI0ekprTUxNbzdtYXczdTM2T0dUWlkxa0RVZjRhVkZsTFZ1M2Y3QXlVUVhfOTgzS1hPekRyaWdsU1hyN3R1MWJPb3dxemQ5SHZDczE4cWtoVHp3OFRrX0JhT3pYcFJsMGNneW13QjNBYTlWMHowcjE1Q2pqRHpBdmVVcnZhSHF0QQ?oc=5" target="_blank">Obligations of insurers related to cybersecurity and outsourcing</a> <font color="#6f6f6f">fanews.co.za</font>
- The Rise of Outsourced Cybersecurity: How CISOs are Adapting to New Challenges - KnowBe4— KnowBe4
<a href="https://news.google.com/rss/articles/CBMikgFBVV95cUxNM0x4R1F4ZGZBVGJfekZxaV9ZdnFQeUhLeUEzYkpuY242WXByN3lqeWVPS2c5Q1NXaEx5MWEyUGtjb2MxLVNhMldnM3RMdk84eElnbDJRVDE2NmFfUUw2RUdRNXhJcldtLUdHdkpVQjE2Z1ExU3VVQXhvVWhZUEppYUdod2pfWkpIUGRxQzdmMG81Zw?oc=5" target="_blank">The Rise of Outsourced Cybersecurity: How CISOs are Adapting to New Challenges</a> <font color="#6f6f6f">KnowBe4</font>
- Security outsourcing on the rise as CISOs seek cyber relief - csoonline.com— csoonline.com
<a href="https://news.google.com/rss/articles/CBMiqgFBVV95cUxOSDgwVlZNbW1fZGNqR2lZbUNtdVhRa1ZLaE5wMUdBV3ZhaDlGa29oWVlQRHJuU3Q1cmhxQ3F1VE9sTzgtNExwc19PaEF6b1N0al9kXzN6R2NKNFdpQVVNRHF2azJiWlVOLTdDOUg3aTg5N21CeUU1ODQ3dFk5VWNlQUswOU5DekotNjFvREFRWGRoaFcxLWpTZzNGNHpwZWczNmJMYWx1Zkkwdw?oc=5" target="_blank">Security outsourcing on the rise as CISOs seek cyber relief</a> <font color="#6f6f6f">csoonline.com</font>
- Why Outsourcing IT and Cybersecurity is the Smart Choice for FQHCs - MedCity News— MedCity News
<a href="https://news.google.com/rss/articles/CBMioAFBVV95cUxPN1pXYUNUbGtocnJTdmlodFJPVTJuNUx5SjVGdUN5cWlkQjZiX0xJSW80WXA3LUhrYjJwT2ZaVzVnZVhJOUp0c1ptTnZBa2pwdnJkaXR0VTEtbUNjSm5IZmptNFFIUkJUZHJLSGRUdHVJZ2lhV2llYjk1MWY2eUx6dWY0U2pvalZOeng0Ul95bWV1VEV4RVZrbmhsckFUTWE1?oc=5" target="_blank">Why Outsourcing IT and Cybersecurity is the Smart Choice for FQHCs</a> <font color="#6f6f6f">MedCity News</font>
- FINRA Highlights Increasing Cybersecurity Risks at Third-Party Providers - Mayer Brown— Mayer Brown
<a href="https://news.google.com/rss/articles/CBMizAFBVV95cUxQcEVVejVpSTJuVzB4T08tRHZ0M3ktU3d3ZUF1bkFiRzJqOTRvbzhoZmdwQU8yN0paWXA3a0QwLUhXTW9pOWxHZms3S3dGZ2J3d1hZSzU2UjVJSWlraFljSjVVY1g1bFpZMXBYako4T19hb2hIcXp6eURRc09tX3czT2xGSGpCX2FxSFRnTGFOOTB1OVExQ0oySnd3YVZTY0VFc05QTFNEVFp3WnRWYmlWbzl3ejN3UmFMRVlGeEFSYl8xekxyU3dVMmN0dTg?oc=5" target="_blank">FINRA Highlights Increasing Cybersecurity Risks at Third-Party Providers</a> <font color="#6f6f6f">Mayer Brown</font>
- The future of automotive cybersecurity: Treating vehicles as endpoints - Help Net Security— Help Net Security
<a href="https://news.google.com/rss/articles/CBMigAFBVV95cUxNMUJzdDFUcnZ3WEhZWElCbWF6TDQtbDhlWXRYZ2d5VVVUSGlwYVJzOTFtelV1aHE5SVU5ZS1uakV3ZVBvN2ExbXJ1eUVlaVNvVFd6eWpYYmwwTXd0TTVDaHJHaUF1LXNNNU5LYlRfYmUwSS0tUkVuOUs1dTc2NXJPNg?oc=5" target="_blank">The future of automotive cybersecurity: Treating vehicles as endpoints</a> <font color="#6f6f6f">Help Net Security</font>
- The Cost of Cybersecurity in Medtech - Medical Product Outsourcing— Medical Product Outsourcing
<a href="https://news.google.com/rss/articles/CBMibkFVX3lxTFBKN2FQbDFUMWNmZXFqYklRdmlJUDhpM2dMbmJKRndnRHpxLXNhSEY4bHBNSWdudkVTbE5ycUFBUFFJT18yZHRBNnQwdTNnY0w0SmhNMGlWQkR0YkZ6ZF83VVVtQ1Q0WE5kc1NqZmZR?oc=5" target="_blank">The Cost of Cybersecurity in Medtech</a> <font color="#6f6f6f">Medical Product Outsourcing</font>
- RBI's Rao flags outsourcing, cybersecurity risks days after Microsoft outage - Mint— Mint
<a href="https://news.google.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?oc=5" target="_blank">RBI's Rao flags outsourcing, cybersecurity risks days after Microsoft outage</a> <font color="#6f6f6f">Mint</font>
- The Board’s understanding of cybersecurity - Deloitte— Deloitte
<a href="https://news.google.com/rss/articles/CBMimwFBVV95cUxNODZwbjlVbHF6T2JMN2Nmdk93UlUzSFdrT2VuNjhpbVRxbHdkSGtfdWZlRzJtMWxyVjgwaTZFLS1Vc3U3S3ZRY2JwV1hvd1E4bksxRThfX1lxLWFIUkFJbC1XTk9TTVZxaElVd21ZNFc1N2VkblI2SWhxWG41VTlTZ3l6LU5jRHBqb0Z4aDZ1M3E4cHlEYUdZV2huMA?oc=5" target="_blank">The Board’s understanding of cybersecurity</a> <font color="#6f6f6f">Deloitte</font>
- Tata Communications appoints Bhaskar Gorti as cloud & cybersecurity chief - Outsource Accelerator— Outsource Accelerator
<a href="https://news.google.com/rss/articles/CBMijAFBVV95cUxOaFZRcmRZRmpQVVlHZ0hOTU9xZWg1M19uMExaQzN2aTY2SVRVWjQ1SVFIb3c0RU9ZY2xxM281MWRRQ0JLTDloaDZHRjd3VFRrcnN3QjVMOVJjN1JQdTVCSnJsWXBZQTNxaE12V044eEVGbEQ0RU1GQjhXX2EtZFZrdDBPMzV1N3ozMy1CRg?oc=5" target="_blank">Tata Communications appoints Bhaskar Gorti as cloud & cybersecurity chief</a> <font color="#6f6f6f">Outsource Accelerator</font>
- Outsourcing Security Without Increasing Risk - Dark Reading— Dark Reading
<a href="https://news.google.com/rss/articles/CBMingFBVV95cUxPNlZ1ekVCM21xaDJMYWlwTFpCSWNUUzAyQnpfUkxwTUg5aWlrd2RoSnZ1ejZ0QnZiRXlYQ3JxNkhpb21OTjNmUjVqRzJtWUFiQ05oV2hVb2dHWGFKRkYtUFFvejhMaElZdkh1aEQ2TFlqTWlwSkZzMDg2Rk84dkV5YWJ3UUo1bVhBVG5wUUJSQjRoMjZwU0U3enZiTGNmUQ?oc=5" target="_blank">Outsourcing Security Without Increasing Risk</a> <font color="#6f6f6f">Dark Reading</font>
- Choosing the right partner when outsourcing cybersecurity - Help Net Security— Help Net Security
<a href="https://news.google.com/rss/articles/CBMilwFBVV95cUxQU3dJTUlMN1NDRlo5elp3X2N2T3Qxd1BMQ1VrTDFfRy1hSEo2Z0xNVXZBUHgwQ19FQzdSNm11cE14c2FpeXZxUFdXYmZOaVVqbmM2TWU4LVV1UDktc2JPTTVCZUdCMDZqaFBtNi0zaGEyOVlRVnJ2X0haWlJzS0hHR21SVDVLSXRoOWhLTzE0RDNTSllwUm0w?oc=5" target="_blank">Choosing the right partner when outsourcing cybersecurity</a> <font color="#6f6f6f">Help Net Security</font>
- How to mitigate the online security risks of outsourcing - Specialty Fabrics Review— Specialty Fabrics Review
<a href="https://news.google.com/rss/articles/CBMipgFBVV95cUxPQl9DWjdzNXZQZXBIWHZJenNPbWlhQTE4dDd6N1QydXhwME5fNEphS0Q2YUtNdmwzOHl3SmNRN21ORkFyMXJaX0gwRlRJSms3ckFEZGdWMmo4RG5zMFVRdGJtdmpzM3ZoRTI4aVZwd21hcVJDWG9xUnZNUjItM0xlWnBuRldTU252RHZ1QkViSnZNZG9HbDNaT3M4TnJ2NmJsbnZxTDJ3?oc=5" target="_blank">How to mitigate the online security risks of outsourcing</a> <font color="#6f6f6f">Specialty Fabrics Review</font>
- BaFin increases focus on IT outsourcing risks - Finextra Research— Finextra Research
<a href="https://news.google.com/rss/articles/CBMikgFBVV95cUxPRTRkXy1fdTg2am5xZTRFaEhzeklzVkxfYW9FX0tyVmdyZjlHNTdOZ29lU1d2cFdfa0FQZUpaUjNkSmZOdFV6WjZHMEtPMm1ENms3SEhTMnNFd0hlVWdTM0pSd0dUaHZRaHFQX2hZbHFVU3FzME5XaU1EU3NxNzB0Z3JQZmR6VVBmNHNJT1BfQ1gxQQ?oc=5" target="_blank">BaFin increases focus on IT outsourcing risks</a> <font color="#6f6f6f">Finextra Research</font>
- Why Mid-Market Companies Should Outsource their Cybersecurity to a Managed Security Service Provider (MSSP) - BDO USA— BDO USA
<a href="https://news.google.com/rss/articles/CBMi0wFBVV95cUxNYTBiclA4endCWVNwMDV5cFRFVnplUndEMkc1a0FiWk9RaFREcTh2bXFhT3o0S1FVSGY0QkNObXV3YWJvSEpnUVZnc2Z3eXpWbXB6elJ5LXZhYVhfOXQwT3RndFlhbTZDQ3JIT090ZUtJT3Z2clZFZTMtbERlbkRRdWZtQ0MyNm9XWWlaR2RvRUwzU1g5QU05enhqY1RUM0pBWElxUEU4Q2ZTQjBKMmxDeF9ENDdFZ2lOXzlOUHZ5d2J1anAtdXFvUGNhRXhBR0FXMlJR?oc=5" target="_blank">Why Mid-Market Companies Should Outsource their Cybersecurity to a Managed Security Service Provider (MSSP)</a> <font color="#6f6f6f">BDO USA</font>
- Four in ten companies plan to outsource cybersecurity - Kaspersky— Kaspersky
<a href="https://news.google.com/rss/articles/CBMiogFBVV95cUxQYzVEa3pOOV9oMm5jVG9SLXNkdk5kVDFHMVd0SmJyY19Lbmd4TFk1MFhYX3dNRFRFU0lUWkppakV2dlR4RmxJYlh0M19uS1RURC1ESkYtbFNsSTJiWDNMQnUzbEtvd1U1bGJoM2lHZS1CZmVXWlVKUEJMamtyYnZFOC1Mc24xamM2dHJQNXY4RmFud1llN2t2dlc4QnhkbGFUbUE?oc=5" target="_blank">Four in ten companies plan to outsource cybersecurity</a> <font color="#6f6f6f">Kaspersky</font>
- Philippines faces shortage of 180,000 cybersecurity professionals - Outsource Accelerator— Outsource Accelerator
<a href="https://news.google.com/rss/articles/CBMifEFVX3lxTE5vS1dfRlY4Z1pENDJBcy1FaUtBLUVRbHpZX0hqTW1sYlZXd0p2X2U4WG1DeEp6dGhWNjk0NDhVR2NiZnctOWVkVjJQTnlKYkF1RHNuMnVDV0dTUkp3ZEF0LXczS1BMV1ZJcUcyRXFjbkR6cE9MVmtFVUpPTlI?oc=5" target="_blank">Philippines faces shortage of 180,000 cybersecurity professionals</a> <font color="#6f6f6f">Outsource Accelerator</font>
- Cybersecurity guidance for small organizations - Borden Ladner Gervais LLP (BLG)— Borden Ladner Gervais LLP (BLG)
<a href="https://news.google.com/rss/articles/CBMijwFBVV95cUxQNlZ0LTQydDJ2OG5lMGpUdU1tdVItZ3Byajl4REZZWE10NU5sRVVCWW1OVFcwRnp1RDcwWHNhZGpPVTItSV9sV04tTF9WUWRDY2ZCZFhKTUZLRTNGV2ZOcW1YeG1fYXN2YlF3bGxVSjR4OERrbVMwcnFLOGNrTGVNZWZiNjQtOWVWdzFBQkQtRQ?oc=5" target="_blank">Cybersecurity guidance for small organizations</a> <font color="#6f6f6f">Borden Ladner Gervais LLP (BLG)</font>
- 'Muddled Libra' Uses Oktapus-Related Smishing to Target Outsourcing Firms - Dark Reading— Dark Reading
<a href="https://news.google.com/rss/articles/CBMipwFBVV95cUxOUExOUFptX2VkN2hHS2Y0ZURzM3c4VDIxUlNEclZfV1g4V2lXYXZfR0hTYURsLVBLMF9CMlM4aV83akFGMUhIMXRkazV4NVA0MVlaWHBsUlVKSlVvdUs2UkFMdjZ1VElFODNkY2p1M3JnNldrRGFXMGE2UUp2NjlBbzZHSThlWElDTTJZRFZtTWY1T3ZKeURvTHNYcjJGdnlyczJ2WnEtVQ?oc=5" target="_blank">'Muddled Libra' Uses Oktapus-Related Smishing to Target Outsourcing Firms</a> <font color="#6f6f6f">Dark Reading</font>
- 4 Benefits of Outsourcing Cybersecurity in Higher Education - EdTech Magazine— EdTech Magazine
<a href="https://news.google.com/rss/articles/CBMipgFBVV95cUxNdFZOZFZmTlRvY3o5T19jRVNJaXVuV1FMNjNNb3c2VW04ZVFBSklCOVV6WUE3aHJ4N3kzM0VaVmt4ZGdjV05PcUtYVkE2bjRWT0diVFpTYnlvQ0E1MUJZNEprbC1oeml2UmtxX1VmOE04ck5rd0JFS2NYX29RWDFjOXIwZ3RISnhaZWtNWE1KcC1qX3hHRlIxek5mV0dVZUxsVW43WGhn?oc=5" target="_blank">4 Benefits of Outsourcing Cybersecurity in Higher Education</a> <font color="#6f6f6f">EdTech Magazine</font>
- Companies outsource external experts as they manage cybersecurity solutions more efficiently - Kaspersky— Kaspersky
<a href="https://news.google.com/rss/articles/CBMi1gFBVV95cUxNWWU4OVotdjZBTlNvejg3ZEFKQ1Ywd1VJNUNOaW94cjhBbjBOdVk4UFpZeERCX3k1djlvV2dhdEdka1dvMDdUbllxRmQ4emplZ09CYWpSaS1WRXQyQkNheEt6ckt2S0t0Z1dnY0NfSXFmNkpwcWpqcFQ2ZXgwVldUMkQxeHd4aGV0RXN0Sk9XcHdGSldGZ3RRcnFrZ3dHcERyNVRqY1UwdUVkeDF2LXlKaEl2ZV9CZUpJcDZnVWg0Z1R2NEtRWGFNTVM1WldWdnFHQlBYbnRB?oc=5" target="_blank">Companies outsource external experts as they manage cybersecurity solutions more efficiently</a> <font color="#6f6f6f">Kaspersky</font>
- Common Cybersecurity Threats and How to Protect Your Business - EisnerAmper— EisnerAmper
<a href="https://news.google.com/rss/articles/CBMihAFBVV95cUxPc3BOUzBuZnF4N3NHVF9CMHUzbHVwUXNTSWROZ2pnUUFGWTRoNjA3VHZ6NS1XejB1ZDY5ZHhTdENfcTlGMThLRFctcGw4dDFidnBkRFh0Q0pkaG9KRFFjc3F2QnRTbk8yNDdBVzJjdFlZWEVDa2dwR3NMOUh2bHVxZWFFbVI?oc=5" target="_blank">Common Cybersecurity Threats and How to Protect Your Business</a> <font color="#6f6f6f">EisnerAmper</font>
- Improving cybersecurity with internal resources and outsourced services - Borden Ladner Gervais LLP (BLG)— Borden Ladner Gervais LLP (BLG)
<a href="https://news.google.com/rss/articles/CBMisAFBVV95cUxOZ0lpVTBCRzdWWV9kRGVoOXhhQzJDTFg0MW1DVGhGUUVoVVViTVNLMHBOZWtSODhyUk00TXVkTGdlZ1B3azN2TGltVlMtMmlHM3R3c3JMek5xc1c5X0VGdmd0b2dJVE5ERV9qX3cwb21fdGw2WkhBaHhFd0d6RDdfYzhlMFFTVHNKaU9MTnNWcXhtRkVKNWE4eV9OdjE3ajhoNjVEWXc3VkRBdGxJemQzTw?oc=5" target="_blank">Improving cybersecurity with internal resources and outsourced services</a> <font color="#6f6f6f">Borden Ladner Gervais LLP (BLG)</font>
- 2022 Gartner® Magic Quadrant™ for Data Outsourcing and Hybrid Infrastructure Managed Services, Worldwide - Deloitte— Deloitte
<a href="https://news.google.com/rss/articles/CBMiswFBVV95cUxQZVNSdmplUGkwMGxCVkp2a1BqY19GcF9QdnRDempXYjU1dTRXWXNkQVZDMFJueThtTlFLdXFYMlVPY19VLUhWX2JONnBzVkQyUi1PZ0RHLW9MZ3dvR0FWOHpCWnJ1UVlJenJoQXdDYWM1dzRnWHpfYnMwRzk2a3ZHVmpITUdaWkF2a0ttV2lvTV9rV3pVQjJrR2dEQXJuSU16ZVU1QlhGN0RpSlVLazNUY2NZMA?oc=5" target="_blank">2022 Gartner® Magic Quadrant™ for Data Outsourcing and Hybrid Infrastructure Managed Services, Worldwide</a> <font color="#6f6f6f">Deloitte</font>
- Saudi Arabian organisations choose to outsource to improve cyber security posture - Computer Weekly— Computer Weekly
<a href="https://news.google.com/rss/articles/CBMixgFBVV95cUxQQjJMSTR1WXBIcG5YaXdCTDUtTW1DWnZQMkd5X1NYRndBNGR6TzZCSHk1VkhIYWVSSUR5WnhUMGRqSl9TVnJsbDRZT18xRXJrWXpBZEtDTUtkOFlrNFV3NWFVMFVKb1dtSGJ6OTlKLWcxbUlIRXdVVGc1SllJdklVUUFFX2R4WngxazQ1UHZIdTZNazFBNHlpZWxjRUxvSk9tZVdVeHpwSVVNQ0N2cGtlUVJFcWxkR3RxUmw5ejNnRVNqUU9IX2c?oc=5" target="_blank">Saudi Arabian organisations choose to outsource to improve cyber security posture</a> <font color="#6f6f6f">Computer Weekly</font>
- Philips expands medical device cybersecurity portfolio - Medical Design & Outsourcing— Medical Design & Outsourcing
<a href="https://news.google.com/rss/articles/CBMioAFBVV95cUxPZm1Qam9EbDJzcU9pbFgyLW5DMENNY2xUUkx4WGNZZlVFSThhQXlpNE1BLWtwdXpMcmx0dUlyX1lvdndZYUhXOWI1OEFLcVBFLWx3WkJzRnBzQjA1YjdUUDh6Q3lCV0FQN2FfMEVFQlU0NFpuZnJ6MnJaaDdNQzF3SjNqRTJqSWt6cmNFR0ZwQzRZTVdiOUpld2FGbWpfMS1w?oc=5" target="_blank">Philips expands medical device cybersecurity portfolio</a> <font color="#6f6f6f">Medical Design & Outsourcing</font>
- Antrim IT firm Outsource buys cyber-security service Ansec - BBC— BBC
<a href="https://news.google.com/rss/articles/CBMiY0FVX3lxTE9xNElGZ1BJUDl5bWRUVmJMLXY2dmxaRkt0WExsOWpTc01CcklCbTVCQlgxbzhXZ09vS25VWjlOcVVZOEw2WElQVHZjZkJPLWZvckM4Rkhkb2RNWlJWUnFHSk1rQQ?oc=5" target="_blank">Antrim IT firm Outsource buys cyber-security service Ansec</a> <font color="#6f6f6f">BBC</font>
- Outsource Cybersecurity Expertise in K–12 Districts with a vCISO - EdTech Magazine— EdTech Magazine
<a href="https://news.google.com/rss/articles/CBMiowFBVV95cUxQVlZrNkUyVU9aeWdaeVluZHR1aGhlSVUtLWlXa0NWZmtORS1RT1dkZUR4cnQ1QWJXS0VWczd1SjNXVFpwa19mUzdXdjd4ZHZBSVNhNVNWcGYyQndGZmFJZ3RLQ0poT2s5QUY5UExsQURlQWtVT09ySXRlb3B5dHpiX0tIMUJpcl8xNHQwV1RqcVhpOTB4MmpRZ3Y2TzU4cnVlZFJ3?oc=5" target="_blank">Outsource Cybersecurity Expertise in K–12 Districts with a vCISO</a> <font color="#6f6f6f">EdTech Magazine</font>
- Cybersecurity Strategic Outsourcing White Paper - Verizon— Verizon
<a href="https://news.google.com/rss/articles/CBMiqgFBVV95cUxPVGd1LVhkZWxDWi1iU3V1NzFTLVdkNE5QM0R1MEdTSE93Q3oyeUIzTS1BRXZZLVlfVkFleVRYeUVZTTkwNTJGSzdjcUh4d1F1dkhZeGF5akI4ZllQaU9paF9sQzJWc1gtazlkZUExNmJwVnJnTUt2NUp0NjRXdDdvaUgzczRjOHVydnZfQ3hyakNWU1lpQl9zLXNxNVdNaUZTaUVmX1FwMGkyQQ?oc=5" target="_blank">Cybersecurity Strategic Outsourcing White Paper</a> <font color="#6f6f6f">Verizon</font>
- Outsourcing: FINRA Outlines Onboarding and Supervision Suggestions for Use of Third-Party Vendors - Morgan Lewis— Morgan Lewis
<a href="https://news.google.com/rss/articles/CBMi0wFBVV95cUxPSjZTc3QzT1pBWTRnNUdiNTJkZERsMUUwS05VUEdPUW1SLTBaMTY3a1JHLWZSYzh5eERGUXdOalYxaWtpTV9DV3MwRGJ6SXVkaTJvX1VNd2pUQ2JrakZTQk5WekZRRjB4dE5Wc25KRklFQlNpX2R4dUZrZ250LTZxZHkydXpscjFiZ0tsQWhrZ01TV21BMHlsTk1ub2o2WGdrRi1uamkyT0hCaFZ3ZU1JQ2xxdF9maXRBaWQ2UG1LWTFEd1AxT2FvVnBvSzRtOE5naWs0?oc=5" target="_blank">Outsourcing: FINRA Outlines Onboarding and Supervision Suggestions for Use of Third-Party Vendors</a> <font color="#6f6f6f">Morgan Lewis</font>
- TCS to set up cybersecurity center in Mexico - Outsource Accelerator— Outsource Accelerator
<a href="https://news.google.com/rss/articles/CBMiiwFBVV95cUxNWGZ2SDR0SFRrbzBia2ZmNzg2dEtuLTdwbEhwaVlkeHVPUjdKUTFKblE3dkgyaUoyVG9VTnFTZWltQ1p5a0ZIcmZlQmJxTkFpUHVNZDB5UlJaaENmVXNJb2ZCY1pYY19HX1J3enItYkF4aUVCcW91aXlwMlYzTjh0Sm5pbUgyWkdkWnk4?oc=5" target="_blank">TCS to set up cybersecurity center in Mexico</a> <font color="#6f6f6f">Outsource Accelerator</font>
- Information security and outsourcing guidelines for B.C. financial institutions - Borden Ladner Gervais LLP (BLG)— Borden Ladner Gervais LLP (BLG)
<a href="https://news.google.com/rss/articles/CBMimgFBVV95cUxQblJNQ3BXLXhUNDFwVmR3XzZiZlZKRWJCbWJFU2wwM0FyQlhqZVVwRjR2QzdfZlFoZFNGM3NCOVExSVAyc1FvMHo1MDRKVldZd2d4dFVEUHR0YjZhSVBxQ3dZaEhCczdYeEFNZWVCRzJnb2dISDFYVzV2T2l5WjZzbnNXWnlwcE5yS3o1cElsakFxR2FwcDRfYmlB?oc=5" target="_blank">Information security and outsourcing guidelines for B.C. financial institutions</a> <font color="#6f6f6f">Borden Ladner Gervais LLP (BLG)</font>
- BD is upping its game on cybersecurity - Medical Design & Outsourcing— Medical Design & Outsourcing
<a href="https://news.google.com/rss/articles/CBMiiwFBVV95cUxPenViSGhmMld3eE10M0N5Tm9pY1VsblhTcVdhelozNFFPZ1A1RldIaGs4NDhfU3daY2hzalNQNUx0M2tQYlZOdk1YYmxxN0t2a3RDSFVFTmoyanNzaFdPelFUaVBoWW00NlBnNTlTN0pCSjhwZzY2UmM0WnZRVmNlZEQ1RWhXMFM1cXhv?oc=5" target="_blank">BD is upping its game on cybersecurity</a> <font color="#6f6f6f">Medical Design & Outsourcing</font>
- Emergo by UL, MedCrypt pair on cybersecurity - Medical Design & Outsourcing— Medical Design & Outsourcing
<a href="https://news.google.com/rss/articles/CBMikgFBVV95cUxPZlRiQThJMTUyYWdqUTBKRkNsY0F6TW9qRHVVbWJZVFN6TVMxQzE5OVZ5ZlNXeU94Y0FHck1OSU9HdkJjRzNFVnFJMnc0S1RUMEdjTzNxWDcyakVuRkdzUWctamZzSl9LTER5Nkt6Y0dFaTRkcDNfRUpNa0R4c0JlcnY2aldFQ0FCM0dkYXlyVjdmdw?oc=5" target="_blank">Emergo by UL, MedCrypt pair on cybersecurity</a> <font color="#6f6f6f">Medical Design & Outsourcing</font>
- Innovative Cybersecurity Research Earns Assistant Professor Yuan Hong the NSF CAREER Award - Illinois Institute of Technology (IIT)— Illinois Institute of Technology (IIT)
<a href="https://news.google.com/rss/articles/CBMisAFBVV95cUxOT2diZ0hob1U1Q3FVU3E5Z01fWmlOT3lQZUN1cndxVC1pVXhrSFRYMUFhamJOQ0JSSlIybm5VOWVkSHlUZzdmMTM0bzAwamZxV0owS0lIRkt0Skx4VmFlS2NodFpTZDlZS0lBMU9mdG5RdGZQbC1idHN0UXprQjVGNTV6NjNWa0twUFZkRlhINkc4R0pSTVhGd3p6TlpQLWprVHUyU3NHTzkwdG5KTFdwMg?oc=5" target="_blank">Innovative Cybersecurity Research Earns Assistant Professor Yuan Hong the NSF CAREER Award</a> <font color="#6f6f6f">Illinois Institute of Technology (IIT)</font>
- Thinking of Outsourcing Your Customer’s Data? What You Need to Know Ahead of Time - MLT Aikins— MLT Aikins
<a href="https://news.google.com/rss/articles/CBMitgFBVV95cUxQZEZJWF9NZ0otdzNreUVwOUxZVVZWa3pPcmpnZElOYWhUenVoNExJV25qRXJkSTN2UzdBSm9XbXU5dF9CM1ExZGRoQThqS0U0dXozWlRGWEhyR19TZkwzWldVVXFOcERUQ1VuSEVFLUs3ZVdRLS1LVHRGUjNPM0pubFB2N3Y2cC1uQXI2T25wRlJyQzFmVDQ2RFhjRWpfVnRwWmV6TnpYNDc1bGVZRGZzWTFfMEVEdw?oc=5" target="_blank">Thinking of Outsourcing Your Customer’s Data? What You Need to Know Ahead of Time</a> <font color="#6f6f6f">MLT Aikins</font>
- Outsourcing election cybersecurity to volunteers - marketplace.org— marketplace.org
<a href="https://news.google.com/rss/articles/CBMijAFBVV95cUxPWEVDbndwaTBoc28yT0RCUjFXOXFvZ0dpcmJfVmN4TTRRQTM4MFh6NjRDTlRjblRDT18tR0toRWh5QWROZDJyYzBianRhYnlpRy1LdjZoWk53Q2g2U0IwLVV1ZV9xcnBPY3FSZUNVcURsV0RoNTFVT3VaVUlmS2szeFNWVXZOSlZkZmtsTw?oc=5" target="_blank">Outsourcing election cybersecurity to volunteers</a> <font color="#6f6f6f">marketplace.org</font>
- Data Privacy and Data Security: Outsourcing to Third Parties and the Effect on Consumers, Companies, and the Cybersecurity Industry as a Whole - CPO Magazine— CPO Magazine
<a href="https://news.google.com/rss/articles/CBMikAJBVV95cUxNaXVQRlNDMWs5eml3LVVnYV94ZW9wbmRRTlA0cmtyYWlha1hyOXpzLTU5TDM2aU9XWUhDeVpwVFUzNEtaVGh6RDhjMlJZMHZXeDdYTDM5cGh0Zy1JbUkxU2t2TEJ0eXIxZmFwNWdwSzlHeUZqaGFfNW1BRm9SbnkwMlBaeHpBbHVsX2gwaVRXMkJyX3lkY0t4ZlAwT3RBVllfNWxPbGdFa0pnNTZ2TXREWTdMNl9tempsVTNlWjloSmtVamxJT0xMRmFGTjVyQ0dYRjhYVXBLdC1nbTVENFE0QjhRNHJCdUV0VkdnT0tFdVhfQ0RWVDJ2VFhldWhvZVNNQ1JzT3AzTjFFWFIta3BNRg?oc=5" target="_blank">Data Privacy and Data Security: Outsourcing to Third Parties and the Effect on Consumers, Companies, and the Cybersecurity Industry as a Whole</a> <font color="#6f6f6f">CPO Magazine</font>
- IT Outsourcing Market Size, Share | CAGR of 8.8% - Market.us— Market.us
<a href="https://news.google.com/rss/articles/CBMiW0FVX3lxTFBZZ1VWaW5aZ0hQWHFwRlpDaWYyeDdpRGtmMkhaSl9uVHpfWXB1N2ZaUlRPVlV4NkdoaF9BVUhJRFo4dmpQTWMzQkppZnpiMEpaNUtYUGl6cmxCdnM?oc=5" target="_blank">IT Outsourcing Market Size, Share | CAGR of 8.8%</a> <font color="#6f6f6f">Market.us</font>
- How to avoid your medical device being hacked - Medical Design & Outsourcing— Medical Design & Outsourcing
<a href="https://news.google.com/rss/articles/CBMilAFBVV95cUxNZ01RM0ZidWs3WDNyYVVDNTByVzdCakoyek05dzNOU3hzNXZSTUx6TFhOWGs2YWt3VUhyenp0QUhpSXVpZFp5NF96b3l3MTE2OTVDejZ0YkpVTGRFOThGdGhPSE9TNXl5RzVPRTV1VGxOZUhyeHluWjlPZGtncHRVME1USElTaXlHSUxYSWR1Qm4tVlJf?oc=5" target="_blank">How to avoid your medical device being hacked</a> <font color="#6f6f6f">Medical Design & Outsourcing</font>
- Cynerio poised to enter U.S. healthcare cybersecurity market - Medical Design & Outsourcing— Medical Design & Outsourcing
<a href="https://news.google.com/rss/articles/CBMipwFBVV95cUxNY0F6VV9YVVdhRnhyQ3o4MHpGX0lJRU5fTXNPQms4NVhweV9INUUydElxZk9Da2dyWGtXejBXQVBES0pMNVVUX2dOSVRZS2lDdll2UURLYzBOaHRwakNySzJaOEtscTFMOGxOQjR0UHRJeHNnUWt4aDNRLUNHMWJac3NBQThJaExkUkJuSnlDdTdBeV9WeHJuMW5yQVI5XzhWQ1htZlZ1WQ?oc=5" target="_blank">Cynerio poised to enter U.S. healthcare cybersecurity market</a> <font color="#6f6f6f">Medical Design & Outsourcing</font>
- Exclusive: Philippines to outsource all cyber security - GovInsider— GovInsider
<a href="https://news.google.com/rss/articles/CBMimAFBVV95cUxPNUJfUEhSU0JOVWdxMDRZZzlrYmZwUkZ3Tmh6QkZtNUdwY0k2WEY3MzlQWkZGajdmZ0lLd2d0X1hMLWVuTk1pbHBtaUNTN09UdENfT2xCU2xQMVFkUFlZVk1aQ1JYME9jY0lBbnhTN1JhSFNvOFlCSmtiVTl1enBVR3BRM3VYemI5LWhlQUw5dWtCSjd5bXl3YQ?oc=5" target="_blank">Exclusive: Philippines to outsource all cyber security</a> <font color="#6f6f6f">GovInsider</font>
- Starbucks CISO Explains Security Outsourcing Model - WSJ— WSJ
<a href="https://news.google.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?oc=5" target="_blank">Starbucks CISO Explains Security Outsourcing Model</a> <font color="#6f6f6f">WSJ</font>
- Revealed: British Airways was in talks with IBM on outsourcing security just before hack - theregister.com— theregister.com
<a href="https://news.google.com/rss/articles/CBMihwFBVV95cUxPM3FQT3JvTUxxMnp4Ulh4aE4tcldnRi1sRFBJRWZXeElSZ0llRURuQmRoaWQ5cGpKWUpoYzRTQkhvMVVHekFzOEJGNWZFNWNlYVFWdHpEUjgtazdqWHduYy1ISG4zNjE1dTRsUWs4TU9PM2l5enM0ZHFaM0c0cEwtMU9kU3pVNHc?oc=5" target="_blank">Revealed: British Airways was in talks with IBM on outsourcing security just before hack</a> <font color="#6f6f6f">theregister.com</font>
- British Airways breach: Outsourcing, legacy systems and even GDPR under fire - Anticipate London— Anticipate London
<a href="https://news.google.com/rss/articles/CBMirAFBVV95cUxNOVpQdlRXVlc0SFBqT1AyOWkzaWczUkpSRWJTREJWSjNkT2QyZWtzUEZCdEhGYm1KQXREbVZ1T0VqV3NxTkNJWXVUMjhpXzRmZHN2QU5UdkRsb21aZDZfb3Z1YTg3QlF2b2lCNEVkVVIzSHRlWFF1NndLQmo5Z0poVjEyc2s2b2J4N0hncmY0clQxbHgtNHRMWnBKZXN6emNNeVJtZm5SRTE1bTFC0gGyAUFVX3lxTE9zUVVOU0FnYnI3bGVkVTFrR1h1VjBBdTgxX0VLckhBdy1hRkM0UWdRdVhBd2xrV0NQUC13djY4azdxX0lMRkNveVdydF95b2lpalVuaktWWFJZdkg5am55MXBpTExwcU9RTWsxNmxvN21RLVN3SWlzVG9uOWN2Ni1BS1V5N2VNWjk2aUtxOTlQY29rMWJ0b3RVNjYzSzBFLTNVUWZlMlBtWGlobDNXUmI1UkE?oc=5" target="_blank">British Airways breach: Outsourcing, legacy systems and even GDPR under fire</a> <font color="#6f6f6f">Anticipate London</font>
- The U.S. Air Force is outsourcing all traditional IT in order to build cybersecurity mission teams - CyberScoop— CyberScoop
<a href="https://news.google.com/rss/articles/CBMieEFVX3lxTE55bEtFV0IyeUxhRlJfN0ItM3FXWWR2VVlwN1RBM1NiRFZQbEVmRXZ1cUpiUUJHYmxmVVAzd3pVMHU2Q2NmY2Nwc2Yzb05FY0ctZExheFpHSzV3T0I4bTdwbFhUc25fS2tvOHkwbmlKUldsWTdxdHdzdw?oc=5" target="_blank">The U.S. Air Force is outsourcing all traditional IT in order to build cybersecurity mission teams</a> <font color="#6f6f6f">CyberScoop</font>
- Attivo Networks receives validation from BD for BOTsink cybersecurity solution - Medical Design & Outsourcing— Medical Design & Outsourcing
<a href="https://news.google.com/rss/articles/CBMitAFBVV95cUxPU1BJbjlFMHV2UmRJQTl0TDJndUJLZGR2bHExSHRYNW0zM203N0gtVXpNQUpfZ2Qzd2FBM0gyXzRJdzRHcXl5cWtIMXUyYUJWR1RHdTcyRWMzNlp4eWZ4cmJlMVFqXzB0TF9veVNmWk11aVhtQzN1QUk4Qjh5d1JjNVRiTlNRTmFaOG0xWVBxdzlDRnU0ZU8xdEtacC1hNGR0bUt2bTFRWURKM3RhMTg1cjZQZEQ?oc=5" target="_blank">Attivo Networks receives validation from BD for BOTsink cybersecurity solution</a> <font color="#6f6f6f">Medical Design & Outsourcing</font>
- Medtech cyber security: 5 questions - Medical Design & Outsourcing— Medical Design & Outsourcing
<a href="https://news.google.com/rss/articles/CBMihgFBVV95cUxNUDRfSlpKY1VKT0xpZkZwSUJTU3RySkRraHlYUlpBbEIzeTZoRTJfbHM5RXp3dkNtLUJpMW5FTGdvZmhWX29mQ0czZWZyNGRaOTctN2o3dDVscDlkZ2xlYlkwbXRKb1JVNS1wd1ZBYzY3OXBiTFB0S2kydWM3U2lmLTFxX3lMQQ?oc=5" target="_blank">Medtech cyber security: 5 questions</a> <font color="#6f6f6f">Medical Design & Outsourcing</font>
- Tale of 'Bob': Does outsourcing new software pose cyber security risk? - The Christian Science Monitor— The Christian Science Monitor
<a href="https://news.google.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?oc=5" target="_blank">Tale of 'Bob': Does outsourcing new software pose cyber security risk?</a> <font color="#6f6f6f">The Christian Science Monitor</font>