Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
eWEEK.com
Search
eWEEK.com
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Studies Offer Insight Into Third-Party Risks, Security Best Practices

    By
    SEAN MICHAEL KERNER
    -
    May 24, 2016
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1Studies Offer Insight Into Third-Party Risks, Security Best Practices

      1 - Studies Offer Insight Into Third-Party Risks, Security Best Practices

      As security remains a top concern among IT professionals, a pair of surveys show areas where organizations direct their focus in mitigating risk.

      2Third Parties Are Prime Breach Suspects

      2 - Third Parties Are Prime Breach Suspects

      Data breaches can come from different sources, though according to Soha Systems’ report, 63 percent are somehow linked to the use of third-party resources.

      3Third-Party Access Is Painful and Slow

      3 - Third-Party Access Is Painful and Slow

      The Soha Systems study found that although most breaches can be linked to third-party resources, getting access to those resources isn’t always easy. In fact, the study found that 57 percent or respondents reported that providing secure remote access is painful to enable, deploy and manage.

      4Will You Get Fired for a Breach?

      4 - Will You Get Fired for a Breach?

      When it comes to accountability, the Soha Systems study found that more than half (53 percent) of respondents would feel personally responsible for a breach in their area, yet only 8 percent expected they would get fired for a breach.

      5Most Successful Organizations Invest in Security Staff

      5 - Most Successful Organizations Invest in Security Staff

      The Infoblox report found that the best IT organizations were more likely to have larger IT security staff investments, including a dedicated incident response team.

      6Security Intelligence Matters

      6 - Security Intelligence Matters

      When looking at how top-tier organizations handle IT security, Infoblox found that leading organizations are more likely to be proactive about security intelligence and make use of Security Information and Event Management (SIEM) technology.

      7Automation Improves Security

      7 - Automation Improves Security

      Infoblox found that top-tier organizations more commonly automate basic network tasks and have detailed configuration and security requirements associated with network devices.

      8Focus on Strategy More Than Tactics

      8 - Focus on Strategy More Than Tactics

      Top-tier organizations tend to focus more on strategy than tactics, according to Infoblox. The focus on strategy keeps organizations more agile, with the ability to provision both users and technology rapidly.

      PrevNext

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      CHRIS PREIMESBERGER - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      CHRIS PREIMESBERGER - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      EWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      ZEUS KERRAVALA - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      WAYNE RASH - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info

      © 2020 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×