Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
CAMBRIDGE, MA -- (Marketwired) -- 03/03/15 -- BitSight Technologies, the standard in Security Ratings, today announced results from a commissioned study, conducted by Forrester Consulting on behalf of BitSight, that reveals third-party security as a top business concern for enterprises. The findings suggest a significant appetite for monitoring third-party security but a steep disconnect in resources available to adequately and objectively manage.
The study, "Continuous Third-Party Security Monitoring Powers Business Objectives and Vendor Accountability," is based on surveys of IT security and risk-management decision makers in the U.S., U.K., France and Germany.
Forrester found that when it comes to tracking third-party risk, critical data loss or exposure (63 percent) and the threat of cyber attacks (62 percent) ranked as the top concerns, above standard business issues, including whether the supplier could deliver the quality and timely service as contracted (55 percent). Despite the desire for more robust insight into third-party security practices, only 37 percent of survey respondents reported tracking any of these metrics on a monthly basis.
The research further reveals that a vast majority of IT decision makers believe that continuous third-party monitoring would have a major improvement on their security effectiveness in key areas, such as event identification time (76 percent), event remediation time (72 percent) and response times to high-profile events (71 percent).
"Across the nine types of third-party information we surveyed IT security decision-makers on, an average of 59% indicated a desire to track and monitor. Yet across those same nine information types, an average of only 22% were tracking with monthly or greater frequency," according to Forrester Consulting. "Enterprises overwhelmingly anticipate major or moderate improvement to many metrics around third-party evaluation, such as the ability to compare security postures, screen vendors based on risk, and evaluate infrastructure configurations. Additionally, enterprises anticipate reductions in times required for security event identification and remediation times and responses to high-profile events."
"The supply chain has become a cyber security minefield for companies, as we've seen with breaches caused by third-party vendors at Target, Neiman Marcus, Goodwill, Home Depot and many more," said Stephen Boyer, CTO and co-founder of BitSight Technologies. "Continuous, data-driven monitoring of third-party security vulnerabilities and threats has become essential for effective vendor risk management."
Other Key Findings:
In addition to releasing the new Forrester study, BitSight is announcing significant enhancements to its innovative Security Ratings product line, strengthening the data breadth, quality and innovation for benchmarking comparative data and third-party risk management. To learn more, click here: http://bitsig.ht/1AOTbn7
About BitSight Technologies
BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums. Based in Cambridge, MA, BitSight is backed by the National Science Foundation, Commonwealth Capital Ventures, Flybridge Capital Partners, Globespan Capital Partners, and Menlo Ventures. For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2776238
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2776240
Contact
Lauren Hillman
Kulesa Faul for BitSight Technologies
Email Contact
510-449-5972
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs