article thumbnail

The deadly effects of high concentration risk

Forrester IT

Increasing cybersecurity guidelines and regulations stem from breaches with a high impact on society and bringing more focus on themes such as supply chain risk. Organizations have experienced a surge in cyberattacks, with attackers using more sophisticated methods to exploit vulnerabilities.

article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

Five little vendors access your data. The first one said, "For this company, vendor management doesn't seem to matta." The fourth one said, "Regulation requires vendor control." And the five little vendors knew their customer hadn't discovered their gaps (in security).

article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

In the aftermath of high-profile data breaches at Sony, Target and Home Depot, chief information officers (CIOs), chief information security officers (CISOs) and other IT security professionals both in government and the private sector are playing from behind. . It is difficult to understand the return on security investments.