Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events Acronis #CyberFit Summit 2021 Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Intel Partner Connect 2021

12 Lessons Learned From The SolarWinds Breach: RSA Conference

From scrutinizing technology suppliers and code used during the application development process to axing on-premise Active Directory, here are 12 key takeaways from the SolarWinds breach.

Back 1 ... 10   11   12   13   Next
photo

Ensure Right Security Architecture Is In Place

It’s not realistic for most customers to audit all their vendors and for vendors to have all their customers auditing them, according to Nir Zuk, Founder and CTO of Palo Alto Networks. Outside of specific vendors that are core to a customer’s business, Zuk said organizations can get a better return on their time and money by ensuring that a comprehensive security architecture is in place.

Organizations should take a zero trust approach to the third-party software they deploy and assume it’s infected, and from there determine what controls can be put in place to minimize damage and fallout, according to Zuk. It’s very hard for companies to live without applications from third-party vendors, and few companies have the time and resources to build every piece of technology they use themselves.

From a technology standpoint, Zuk said businesses should walk in the footsteps of an adversary and see what their organization’s security looks like from the outside. Companies should also took a closer look at what their internal processes look like from a security standpoint, according to Zuk.

 
 
Back 1 ... 10   11   12   13   Next

sponsored resources