There are myriad security risks in giving third-party vendors access to your network and data. If a third party gets hacked, your company can lose vital business data, and confidential employee information can be compromised.
The Defense Department may now officials exclude contractors or subcontractors from receiving information technology contracts based on the risk their supply chain poses to national security systems, Fierce Government reports.
For enterprises considering higher level and more integrated physical and logical security, identity and access management solutions through smart cards or more sophisticated credentialing, keep your head out of the technology razzle-dazzle.
For the next generation of enterprise security leaders, is there a clear path forward to success? Enterprise security leaders discuss mentorships, education, certifications and the skills new CSOs and CISOs will need to succeed in their evolving roles and bring value to the business. But the problem is: with existing security leadership roles varying so widely, is the development of a uniform skill set even possible?