Now Tec BlogNow Tec Blog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Cómo controlar ChatGPT con la voz y hablar con él

    September 23, 2023

    MGM says hotel reservations back online as company deals with cyber attack

    September 23, 2023

    Poland’s PM tells Ukraine’s Zelenskyy to ‘never insult’ Polish people again | Russia-Ukraine war News

    September 23, 2023
    Facebook Twitter Instagram
    • Home
    • Business

      6 critical things to know about the autoworkers strike that threatens to reshape the economy, politics, and labor’s future

      September 23, 2023

      ‘I felt betrayed’: Health influencers are gaining notoriety for lies and lawsuits over deceptive marketing and claims that are too good to be true

      September 22, 2023

      Chase Ink Business Unlimited review: an easy 1.5% cash back on all purchases

      September 22, 2023

      After calamitous wildfires, California hopes to avert a collapse of its home insurance market by making rules more business friendly

      September 22, 2023

      Chase Ink Business Cash Review: 5% cash back for established businesses

      September 22, 2023
    • Gadgets

      Netflix Fall of the House of Usher Review: Exquisite Poe Tribute

      September 23, 2023

      You can find love on Tinder for $500 a month, if you qualify for its elite tier

      September 22, 2023

      iPhone 15 stuck on the Apple logo during setup? Here’s how to fix it

      September 22, 2023

      The FTC may file an antitrust lawsuit against Amazon as soon as next week

      September 22, 2023

      Bowing to pressure, Unity announces the terms of its surrender

      September 22, 2023
    • Tech

      Unity May Never Win Back the Developers It Lost in Its Fee Debacle

      September 22, 2023

      Satellite Images Show the Devastating Cost of Sudan’s Aerial War

      September 22, 2023

      ‘Majority’ Imagines Internet Hate Mobs to the Extreme

      September 22, 2023

      These scientists live like astronauts without leaving Earth

      September 22, 2023

      Inside the Race to Stop a Deadly Viral Outbreak in India

      September 22, 2023
    • World

      Poland’s PM tells Ukraine’s Zelenskyy to ‘never insult’ Polish people again | Russia-Ukraine war News

      September 23, 2023

      Russia-Ukraine war: List of key events, day 577 | Russia-Ukraine war News

      September 23, 2023

      US auto workers expand strike as Biden prepares to join picket line | News

      September 23, 2023

      Amid canal dispute, Haitian migrants prepare to leave Dominican Republic | Border Disputes News

      September 22, 2023

      Young Chinese choose dating, staying single as marriages decline in China | Arts and Culture News

      September 22, 2023
    • AI

      AI now bringing Jesus to your phone

      September 23, 2023

      World must pass ‘AI stress test’, UK Deputy PM says, announcing summit

      September 23, 2023

      AI could be the next tool to prevent veteran suicide

      September 22, 2023

      Leader Schumer Holds the Senate’s Inaugural AI Insight Forum — AI: The Washington Report | Mintz – Antitrust Viewpoints

      September 22, 2023

      AI Legal News Summer Roundup: Edition 5 | White & Case LLP

      September 22, 2023
    • Apple

      Best MacBook deals: 15-inch and 13-inch MacBook Airs at all-time low prices at Best Buy

      September 22, 2023

      Alexa Generative AI Update Reveal At Amazon’s Annual Device Event – Amazon.com (NASDAQ:AMZN)

      September 22, 2023

      Alexa Generative AI Update Reveal At Amazon’s Annual Device Event – Amazon.com (NASDAQ:AMZN)

      September 22, 2023

      Pay For Higher Gas Prices With These Oil Dividends

      September 22, 2023

      US Secretary of State Anthony Blinken Praises William Ruto for Promoting Democracy, Growing Economy

      September 22, 2023
    • ChatGPT

      Cómo controlar ChatGPT con la voz y hablar con él

      September 23, 2023

      Browse With Bing Returns To ChatGPT iPhone App With Links

      September 22, 2023

      What the Tech? Can ChatGPT help students?

      September 22, 2023

      How companies are embracing generative AI…or not

      September 22, 2023

      George R.R. Martin demanda a ChatGPT por “robo masivo”

      September 22, 2023
    • Cyber Security

      MGM says hotel reservations back online as company deals with cyber attack

      September 23, 2023

      Bragar Eagel & Squire, P.C. Reminds Investors

      September 23, 2023

      ‘Power, influence, notoriety’: The Gen-Z hackers who struck MGM, Caesars

      September 22, 2023

      Governor Confirms A ‘Major Cyber-Attack’

      September 22, 2023

      RapidAscent’s Cyber Security Apprenticeship Program Earns California State Recognition

      September 22, 2023
    • Computing

      Recent Updates on Foreign Investment Restrictions and Export Controls Governing Semiconductors, Quantum Computing and Artificial Intelligence (AI) | Pillsbury Winthrop Shaw Pittman LLP

      September 23, 2023

      The US Could Require Cloud Computing Providers to Report Some Customers

      September 22, 2023

      Chan Zuckerberg Initiative Announces Project to End Human Disease

      September 22, 2023

      ARPA-H Data Fabric, Computing for Research, NextGen911

      September 22, 2023

      Can cloud-based quantum computing really offer a quantum advantage?

      September 22, 2023
    • Science

      Science Researcher at MCG to receive $90,000 grant to fix retinopathy of prematurity

      September 23, 2023

      PolyU researcher excels in fiber science and

      September 23, 2023

      The best workout apps for all kinds of exercisers

      September 23, 2023

      GSW’s bachelor’s degree in computer science accredited by ABET – Americus Times-Recorder

      September 22, 2023

      Watch: Chicago Students Mark Museum of Science and Industry’s 90th Birthday with Volcanic Eruptions | Chicago News

      September 22, 2023
    Facebook Twitter Instagram
    Now Tec BlogNow Tec Blog
    • Home
    • Business

      6 critical things to know about the autoworkers strike that threatens to reshape the economy, politics, and labor’s future

      September 23, 2023

      ‘I felt betrayed’: Health influencers are gaining notoriety for lies and lawsuits over deceptive marketing and claims that are too good to be true

      September 22, 2023

      Chase Ink Business Unlimited review: an easy 1.5% cash back on all purchases

      September 22, 2023

      After calamitous wildfires, California hopes to avert a collapse of its home insurance market by making rules more business friendly

      September 22, 2023

      Chase Ink Business Cash Review: 5% cash back for established businesses

      September 22, 2023
    • Gadgets

      Netflix Fall of the House of Usher Review: Exquisite Poe Tribute

      September 23, 2023

      You can find love on Tinder for $500 a month, if you qualify for its elite tier

      September 22, 2023

      iPhone 15 stuck on the Apple logo during setup? Here’s how to fix it

      September 22, 2023

      The FTC may file an antitrust lawsuit against Amazon as soon as next week

      September 22, 2023

      Bowing to pressure, Unity announces the terms of its surrender

      September 22, 2023
    • Tech

      Unity May Never Win Back the Developers It Lost in Its Fee Debacle

      September 22, 2023

      Satellite Images Show the Devastating Cost of Sudan’s Aerial War

      September 22, 2023

      ‘Majority’ Imagines Internet Hate Mobs to the Extreme

      September 22, 2023

      These scientists live like astronauts without leaving Earth

      September 22, 2023

      Inside the Race to Stop a Deadly Viral Outbreak in India

      September 22, 2023
    • World

      Poland’s PM tells Ukraine’s Zelenskyy to ‘never insult’ Polish people again | Russia-Ukraine war News

      September 23, 2023

      Russia-Ukraine war: List of key events, day 577 | Russia-Ukraine war News

      September 23, 2023

      US auto workers expand strike as Biden prepares to join picket line | News

      September 23, 2023

      Amid canal dispute, Haitian migrants prepare to leave Dominican Republic | Border Disputes News

      September 22, 2023

      Young Chinese choose dating, staying single as marriages decline in China | Arts and Culture News

      September 22, 2023
    • AI

      AI now bringing Jesus to your phone

      September 23, 2023

      World must pass ‘AI stress test’, UK Deputy PM says, announcing summit

      September 23, 2023

      AI could be the next tool to prevent veteran suicide

      September 22, 2023

      Leader Schumer Holds the Senate’s Inaugural AI Insight Forum — AI: The Washington Report | Mintz – Antitrust Viewpoints

      September 22, 2023

      AI Legal News Summer Roundup: Edition 5 | White & Case LLP

      September 22, 2023
    • Apple

      Best MacBook deals: 15-inch and 13-inch MacBook Airs at all-time low prices at Best Buy

      September 22, 2023

      Alexa Generative AI Update Reveal At Amazon’s Annual Device Event – Amazon.com (NASDAQ:AMZN)

      September 22, 2023

      Alexa Generative AI Update Reveal At Amazon’s Annual Device Event – Amazon.com (NASDAQ:AMZN)

      September 22, 2023

      Pay For Higher Gas Prices With These Oil Dividends

      September 22, 2023

      US Secretary of State Anthony Blinken Praises William Ruto for Promoting Democracy, Growing Economy

      September 22, 2023
    • ChatGPT

      Cómo controlar ChatGPT con la voz y hablar con él

      September 23, 2023

      Browse With Bing Returns To ChatGPT iPhone App With Links

      September 22, 2023

      What the Tech? Can ChatGPT help students?

      September 22, 2023

      How companies are embracing generative AI…or not

      September 22, 2023

      George R.R. Martin demanda a ChatGPT por “robo masivo”

      September 22, 2023
    • Cyber Security

      MGM says hotel reservations back online as company deals with cyber attack

      September 23, 2023

      Bragar Eagel & Squire, P.C. Reminds Investors

      September 23, 2023

      ‘Power, influence, notoriety’: The Gen-Z hackers who struck MGM, Caesars

      September 22, 2023

      Governor Confirms A ‘Major Cyber-Attack’

      September 22, 2023

      RapidAscent’s Cyber Security Apprenticeship Program Earns California State Recognition

      September 22, 2023
    • Computing

      Recent Updates on Foreign Investment Restrictions and Export Controls Governing Semiconductors, Quantum Computing and Artificial Intelligence (AI) | Pillsbury Winthrop Shaw Pittman LLP

      September 23, 2023

      The US Could Require Cloud Computing Providers to Report Some Customers

      September 22, 2023

      Chan Zuckerberg Initiative Announces Project to End Human Disease

      September 22, 2023

      ARPA-H Data Fabric, Computing for Research, NextGen911

      September 22, 2023

      Can cloud-based quantum computing really offer a quantum advantage?

      September 22, 2023
    • Science

      Science Researcher at MCG to receive $90,000 grant to fix retinopathy of prematurity

      September 23, 2023

      PolyU researcher excels in fiber science and

      September 23, 2023

      The best workout apps for all kinds of exercisers

      September 23, 2023

      GSW’s bachelor’s degree in computer science accredited by ABET – Americus Times-Recorder

      September 22, 2023

      Watch: Chicago Students Mark Museum of Science and Industry’s 90th Birthday with Volcanic Eruptions | Chicago News

      September 22, 2023
    Now Tec BlogNow Tec Blog
    Home»Cyber Security»How Should CISOs Approach Supply Chain Cybersecurity?
    Cyber Security

    How Should CISOs Approach Supply Chain Cybersecurity?

    eduardo_alves38By eduardo_alves38May 31, 2023Updated:May 31, 2023No Comments5 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    How Should CISOs Approach Supply Chain Cybersecurity?
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Among the long list of priorities for cybersecurity leaders, potential blind spots in the digital supply chain are becoming increasingly important. Enterprises are beginning to understand their own boundaries, but the steps to improve third-party security are much less clear. So how can a CISO effectively assure his chain partners of supply as he tries to tackle this new frontier? And what does that mean for the enterprise security landscape?

    next frontier

    Security is never truly “solved,” but modern CISOs and their teams recognize the need to put necessary procedures in place or get a firm grip on immediate (first-party) security. It is no exaggeration to say that there are Or to understand the steps an organization should take to understand the risks.

    But there is still work to be done when it comes to supply chain security, which includes not only third parties, but also fourth and potentially even lower parties in the supply chain. In ClubCISO’s latest annual Security Maturity Report, 29% of responding organizational member groups cite supply chains as the top barrier to their security goals, making supply chains a household name for security leaders around the world. It ranks fourth after constant factors such as staffing, budgets, and rapid business change. globe.

    We need to recognize that supply chains come in many forms. In the digital ecosystem, these may also include potential suppliers of services, organizations to which enterprises outsource certain business functions, and vendors who provide the fabric (software providers) that run their businesses. I have. On a related note, a ClubCISO report found that supply chain vulnerabilities accounted for 22% of high-profile cyber incidents in the 12 months to 2022. Depending on whether the vulnerability hits a vendor or a supplier, the impact on the affected business will be different.

    For example, third-party service providers work closely with their clients and often hold potentially sensitive internal information, so in this case, companies may consider this an incident to respond to. Essential. On the other hand, if a software provider were to have a security incident, companies would have relatively few guarantees.

    The increased complexity, variables, and entry points associated with these supply chains are the main reasons why Zero Trust strategies are so prevalent in the security space. This harder-line approach reduces the risk of business-impacting supply chain breaches by making security within the system perimeter more robust, but it doesn’t completely solve the problem. This is because Zero Trust authorization has no effect at all if the authorizing third party has already been compromised.

    Instead, organizations should evaluate third-party vendors (where possible) and suppliers to ensure adequate security that does not jeopardize system integrity.

    Rob Robinson

    Social link navigation

    Head of Telstra Purple for EMEA

    Rob Robinson is Head of Telstra Purple in EMEA.

    How do you rate your supply chain partners?

    The practice of auditing third-party partners is still in its infancy, despite the growing awareness that there are many dangerous blind spots throughout the supply chain. According to the latest UK government data, only 13% of companies consider the risks posed by their direct suppliers, and even less when it comes to their broader supply chains (7%). Because of this, there is no standardization regarding the correct approach. How do you audit your vendors? How regularly? How do you approach the hundreds of suppliers already in your supply chain?

    There are some challenges that need to be addressed. Of course, qualifying new and existing suppliers from the start can be daunting, so securing buy-in in terms of both investment and cooperation from stakeholders and suppliers is important. Education may be required here to address the lack of understanding of the cybersecurity risks of inadequate supply chains. Other technical challenges include limited visibility across the supply chain and inadequate tools and knowledge to accurately audit a supplier’s level of security.

    So how should companies deal with this? The first key principle is that security professionals should be involved in certifying new vendors from the beginning, but this is usually not the case. When auditing vendor security, you need to focus on the value of information available to third parties, not just the sheer volume of information. Identify your “best jewels” and audit them top-down from there. Once you have established your approach to supply chain auditing, start by applying it to new supplier relationships. Once the approach has been refined and works well, apply it to existing suppliers, review contracts, and support suppliers as needed.

    Overall picture

    Despite the challenges and effort involved, security teams at large organizations are embracing vendor security audits not only as a benefit to their supply chain security, but as an overall corporate social responsibility. need to start. CISOs need to move away from viewing vendor audits as a chore and look at the bigger picture. Larger companies validating smaller vendors will drive growth and increase the marketability of vendors elsewhere. This advantage for vendors also provides more incentives for vendors to participate in such rigorous security assessments.

    Ultimately, this will have a significant impact on growth and support the “digital ecosystem” model that most industries aspire to. As more companies move to a cloud-first strategy, integrating and partnering with more companies and vendors to better serve their customers and scale operations faster, this is the direction security professionals should go. is. Larger companies that adopt this approach early will not only protect themselves from one of the leading sources of cyber incidents, but will also become more valuable partners to smaller vendors and ultimately will support and improve cyber security across enterprises and industries.

    We’ve featured the best business VPNs.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    eduardo_alves38
    • Website

    Related Posts

    MGM says hotel reservations back online as company deals with cyber attack

    September 23, 2023

    Bragar Eagel & Squire, P.C. Reminds Investors

    September 23, 2023

    ‘Power, influence, notoriety’: The Gen-Z hackers who struck MGM, Caesars

    September 22, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks

    Cómo controlar ChatGPT con la voz y hablar con él

    September 23, 2023

    Browse With Bing Returns To ChatGPT iPhone App With Links

    September 22, 2023

    What the Tech? Can ChatGPT help students?

    September 22, 2023

    How companies are embracing generative AI…or not

    September 22, 2023
    Top Reviews
    Advertisement
    Demo
    Now Tec Blog
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • About us
    • DMCA
    • Privacy Policy
    © 2023 nowtecblog. Designed by nowtecblog.

    Type above and press Enter to search. Press Esc to cancel.