PRO+ Premium Content/Information Security
Access your Pro+ Content below.
5 steps to get IoT cybersecurity and third parties in sync
This article is part of the Information Security issue of November 2020, Vol. 21, No. 4
The rapid proliferation of internet-connected devices within business and industrial networks is driving the need for holistic third-party risk management practices at many organizations. A recent study by the Ponemon Institute on behalf of Shared Assessments, a global membership organization focused on third-party risk management, showed high awareness of how IoT cybersecurity and third parties are often at odds in enterprise. IT and business leaders recognize the risk, and yet major gaps remain in existing security programs to address these risks. Of the 630 respondents in the survey, nearly nine out of 10 expected their organizations to experience an IoT-related breach or cyber attack, but just 47% evaluated third-party IoT security vulnerabilities and privacy practices before working with a vendor. Though most survey-takers reported increases in the number of third parties their companies work with, less than one-third monitored the risk of IoT devices used or supplied by their third parties. Only 36% tracked the data the ...
Features in this issue
-
COVID-19 cybersecurity data shows rising risk during remote pivot
When enterprises quickly pivoted to remote work during the pandemic, it prompted a wave of new threats while also widening existing gaps in cybersecurity postures.
-
5 steps to get IoT cybersecurity and third parties in sync
Third parties often prove to be the weak links when it comes to IoT cybersecurity. Learn what you can do to minimize the risk while reaping the benefits that outside vendors bring.
News in this issue
-
AI in cybersecurity ups your odds against persistent threats
AI capabilities can identify and take down cyberthreats in real time but are only part of what your team needs to come out on the winning side of the cybersecurity battle.
-
AI in security analytics is the enhancement you need
AI-powered analytics is critical to an effective, proactive security strategy. Learn how AI-enabled tools work and what your organization needs to do to reap their benefits.
Columns in this issue
-
Cybersecurity for remote workers: Lessons from the front
Tackle the security challenges COVID-19 wrought by using this playbook from an experienced disaster-zone responder.
-
Weighing the future of firewalls in a zero-trust world
Cybersecurity pros have been predicting the firewall's demise for years, yet the device is still with us. But does it have a place in zero-trust networks? One analyst says yes.