Third-party access: The overlooked risk to your data protection plan

A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping […]

The post Third-party access: The overlooked risk to your data protection plan appeared first on Security Intelligence.

Continue reading Third-party access: The overlooked risk to your data protection plan

Most organizations want security vendor consolidation

Cybersecurity is complicated, to say the least. Maintaining a strong security posture goes far beyond knowing about attack groups and their devious TTPs. Merely understanding, coordinating and unifying security tools can be challenging. We quickly passed through the “not if, but when” stage of cyberattacks. Now, it’s commonplace for companies to have experienced multiple breaches. […]

The post Most organizations want security vendor consolidation appeared first on Security Intelligence.

Continue reading Most organizations want security vendor consolidation

Using Vendor Management to Defend Against Supply Chain Attacks

Supply chain attacks are growing more common. According to the Identity Theft Resource Center (ITRC), there were just 19 supply chain attacks in the final quarter of 2020. In the following quarter, that volume grew to 27 attacks — an increase of 42%. Those incidents in Q1 2021 affected 137 U.S. groups and a total […]

The post Using Vendor Management to Defend Against Supply Chain Attacks appeared first on Security Intelligence.

Continue reading Using Vendor Management to Defend Against Supply Chain Attacks

Adopting Microsegmentation Into Your Zero Trust Model, Part 2

This is the second part in a series on zero trust and microsegmentation. Be sure to check out Part 1 here. Organizations are increasingly using a zero trust approach combined with microsegmentation to carefully balance the needs of security and access. Companies work with most vendors on a purely transactional basis — those vendors simply […]

The post Adopting Microsegmentation Into Your Zero Trust Model, Part 2 appeared first on Security Intelligence.

Continue reading Adopting Microsegmentation Into Your Zero Trust Model, Part 2

Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Cybersecurity frameworks are notoriously expensive to build and maintain. And, business leaders are frequently dissatisfied with their effectiveness. According to research conducted by the Ponemon Institute, enterprises spend an average of $2.86 million per year on their in-house security operations center (SOC), with more than half of those costs allocated to labor. Yet, barely more than […]

The post Cybersecurity Operations: 5 Ways to Cut Costs Without Pain appeared first on Security Intelligence.

Continue reading Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Vendor Management: 7 Tips for Security During Remote Work

Third-party vendor management can be a risk to an organization’s data and network security. Enterprises depend on vendors to use security best practices that meet company standards while using their services when they have access to the company network. But that was when most people were working from their company’s physical place of business and […]

The post Vendor Management: 7 Tips for Security During Remote Work appeared first on Security Intelligence.

Continue reading Vendor Management: 7 Tips for Security During Remote Work

82 Percent of Organizations Still Use Spreadsheets to Manage Third Parties

A main tenet of managing vendor risk is knowing your third parties. A recent study by Forrester Research reported that four out of five organizations still use spreadsheets to inventory, assess, and manage third-party relationships. Find out where org… Continue reading 82 Percent of Organizations Still Use Spreadsheets to Manage Third Parties

Change the Security Conversation to Help Advance Your Business

By changing the cultural definition and conversation around security, business leaders can better reduce complexity in security ecosystems, orchestrate security responses and embrace open source.

The post Change the Security Conversation to Help Advance Your Business appeared first on Security Intelligence.

Continue reading Change the Security Conversation to Help Advance Your Business

Setting Up a Vendor Management Program

Vendor management is a process or solution that allows organizations to optimize and secure the introduction and ongoing operations of third-party service providers into their business operations. An ideal platform provides centralized management of a… Continue reading Setting Up a Vendor Management Program

5 Must-Haves for Your Next Managed Security Services Provider (MSSP)

With a modern managed security services provider (MSSP), organizations can gain the specialized skills needed to cost-effectively protect against the increasing range, volume and severity of threats.

The post 5 Must-Haves for Your Next Managed Security Services Provider (MSSP) appeared first on Security Intelligence.

Continue reading 5 Must-Haves for Your Next Managed Security Services Provider (MSSP)