We continue with our “007 Life Lessons through the Verizon Breach Report” series, which combines lessons from a gadget wielding international crime-fighter like James Bond with data from the DBIR to secure our enterprises. Today is the turn of lesson 2: Communication. These lessons come from a recent presentation by our CEO Anders Norremo and…
Here’s the first of seven lessons we can learn from James Bond to secure our enterprises and how they relate to Verizon’s Data Breach Report.
Manufacturers rely on vendors that might develop vulnerable components. So who’s in charge of securing IoT devices and minimizing this third-party risk?
A ransomware attack against a vendor of a fund administrator exposed data of investors. We analyze how a TPRM program can help prevent a Third-Party Data Breach like this.
The OWASP Top 10 is a good starting point for detecting possible issues around third-party components. So how does it relate to TPRM?
The former CEO of Intel, Brian Kzranich said last month, “Data, I look at it as the new oil. It’s going to change most industries across the board. Oil changed the world in the 1900s. It drove cars, it drove the whole chemical industry,” Krzanich explains.
A new report states that 60% of organizations go out of business within 6 months of a cyber attack. Here’s why you need to invest in security software for businesses.