article thumbnail

Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain

Security Affairs

A recent report, B2B IAM – The Hidden Value of Third-Party Identities , indicates that external identities outnumber traditional employees by nearly two to one. Zero Trust is a comprehensive security framework that fundamentally changes how organizations approach cybersecurity. account for nearly half of the total users (48%).

B2B 315
article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

As technology evolves and our dependence on digital systems increases, the cybersecurity threat landscape also rapidly changes, posing fresh challenges for organizations striving to protect their assets and data. Cybersecurity has always been seen as a catch-up game, with determined adversaries a step ahead.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks. alone, in fact, there are more than 5,000 cybersecurity vendors. All of this activity has put a strain on how companies buy and sell cybersecurity solutions.

article thumbnail

Influencing Change as Security Leader: Communication Is Key

Data Breach Today

Nordstrom CISO Nicole Darden Ford Shares Her Journey From B2B to B2C Industry From working in B2B industries to now shifting to a B2C industry, Nicole Darden Ford, CISO, Nordstrom, is confident of bringing a fresh perspective to tackling the retail sector's complex cybersecurity and fraud challenges.

B2C 173
article thumbnail

Best Practices Q&A: The importance of articulating how cybersecurity can be a business enabler

The Last Watchdog

The technology and best practices for treating cybersecurity as a business enabler, instead of an onerous cost-center, have long been readily available. Now comes a Forrester Research report that vividly highlights why attaining and sustaining a robust cybersecurity posture translates into a competitive edge.

article thumbnail

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

The Last Watchdog

Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity. Related: Automating threat feed analysis Peerlyst is another step in that direction.

article thumbnail

Ransomware Hits B2B Payments Firm Billtrust

Krebs on Security

He declined to discuss anything related to the ransomware attack, such as whether the company paid a ransom demand in exchange for a key to unlock files scrambled by the malware, although he allowed Billtrust does have cybersecurity insurance for just such occasions.

B2B 139