I dislike cliches. I suspect I’m not alone in that, but the truth is I’m guilty of using them on occasion — and I’m probably not alone in that, either.…
Browsing CategoryThird-Party Vendors
5 Global Supply Chain Security Threats (and How to Handle Them)
In December 2020, a nation-state attack on the SolarWinds network management system compromised the supply chains of over 18,000 organizations, including the Pentagon and the Department of Homeland Security. With…
Adopting Microsegmentation Into Your Zero Trust Model, Part 2
This is the second part in a series on zero trust and microsegmentation. Be sure to check out Part 1 here. Organizations are increasingly using a zero trust approach combined…
Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach
“It has gotten to the point, unfortunately, where they are so frequent and common these days, that it’s like, here we go again,” Christopher Sitter says when I asked him about…
Vendor Management: 7 Tips for Security During Remote Work
Third-party vendor management can be a risk to an organization’s data and network security. Enterprises depend on vendors to use security best practices that meet company standards while using their…
Should Organizations Be Operating Outside of Their Risk Appetite?
Business opportunities around the world have increased significantly as the online presence of individuals and businesses has increased during lockdowns enforced due to the novel coronavirus pandemic. But with added…
Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity
Healthcare cybersecurity attacks are on the rise. As Protenus notes, industry data breaches increased by 48 percent between 2018 and 2019, with more than 41 million patient records compromised. Meanwhile,…
How Can Airlines Protect Their Customers and Data From Evolving Cyberthreats?
Airlines have long been a symbolic target for nation-state actors due to their close identification with their host countries, but that threat landscape has since widened considerably to include financially…
5 Must-Haves for Your Next Managed Security Services Provider (MSSP)
Business environments are forcing organizations to rapidly evolve. Security and risk leaders are realizing that a modern security strategy requires dramatic changes to program governance, technology and execution. Yet many…
Why a Cybersecurity Assessment Needs to Be Part of Your M&A Due Diligence Checklist
Mergers and acquisitions (M&As) are a critical part of doing business in our modern, hypercompetitive world. Of all the factors that go into the valuation of a deal, cybersecurity occupies…