article thumbnail

The deadly effects of high concentration risk

Forrester IT

Increasing cybersecurity guidelines and regulations stem from breaches with a high impact on society and bringing more focus on themes such as supply chain risk. Organizations have experienced a surge in cyberattacks, with attackers using more sophisticated methods to exploit vulnerabilities.

article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

Five little vendors access your data. The first one said, "For this company, vendor management doesn't seem to matta." The fourth one said, "Regulation requires vendor control." In honor of Halloween, it seems appropriate to address one of the scariest issues facing organizations today: vendor or supplier management.

article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

So part of our goal is to help an enterprise establish foundational security tenets – basically guidelines and principles – that can help them weather turnover in the security cadre. If you go into some enterprises, they will spend an inordinate amount of money on identity management or a PKI certificate or data loss protection.