Modernizing patch management in an evolving IT security landscape

Modernizing patch management in an evolving IT security landscape

Today’s IT security landscape is more complex than ever before, and will only continue to evolve. The rapid adoption of new technologies, the shift to hybrid work environments, and the proliferation of third-party applications have introduced new risks and expanded attack surfaces for organizations worldwide. The increased use of these third-party applications, particularly on dispersed endpoints (i.e. laptops), can expose an organization to significant vulnerabilities. For example, dispersed endpoints leave a risk of a bad…

Read More

Financial consequences of ignoring security debt in 2024

Financial consequences of ignoring security debt in 2024

For years, large organizations have leaned on the assurances provided by their software suppliers’ certifications such as SOC 2 and ISO27001, assuming certifications meant that vendors’ security measures were up to par. However, due to a recent shift in hackers focus the spotlight is now turned towards the software supply chain. If it wasn’t crystal clear, then it is now: vendors’ vulnerabilities aren’t just theirs — they’re yours too. What might have once seemed like…

Read More

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

13% of businesses continuously monitor third-party vendor security risks

13% of businesses continuously monitor third-party vendor security risks

13% of businesses continuously monitor third-party vendor security risks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Third-party risk challenges presented by the Great Resignation

Third-party risk challenges presented by the Great Resignation

Third-party risk challenges presented by the Great Resignation | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Software supply chain security guidance for developers

Software supply chain security guidance for developers

Software supply chain security guidance for developers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How to secure organizational SaaS and increase third-party visibility

How to secure organizational SaaS and increase third-party visibility

How to secure organizational SaaS and increase third-party visibility | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Fourth-party risk management is essential for software supply chain security

Fourth-party risk management is essential for software supply chain security

Fourth-party risk management is essential for software supply chain security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Managing data protection and third-party risk with AI

Managing data protection and third-party risk with AI

Managing data protection and third-party risk with AI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2 3