Editor's Pick(1 - 4 of 8)
THANK YOU FOR SUBSCRIBING
Mind The Gap: It's Time To Rethink the Security of Your Business-Critical Applications
By Nick bowman, Senior Manager, EMEA and APJ Corporate Communications, CyberArk
The main issue that we are witnessing in the industry is the gap that exists between what organizations think they are achieving in terms of securing their business-critical apps and what’s actually going on. At CyberArk, we recently surveyed 1,450 business and IT decision-makers in EMEA on their security strategies for securing the applications that the business runs on. The results were quite telling.
While 72% of those surveyed were confident that their organization could successfully prevent a cyber attack that could affect their business-critical apps, the reality is that only 31% actually prioritize putting in place specific protection against attacks on them.
It’s time for businesses to consider their organizational risk as a whole
This means that most companies treat the security of applications that are their lifeblood exactly the same as, say, their internal holiday booking system. This has to be wrong.
The reality is that perimeter security is no longer what businesses should be prioritizing and with Forrester estimating that 80% of data breaches involve compromised privileged credentials, businesses need to rethink their strategies. Companies should always assume that the hacker is already in, as our research shows: nearly 56% of large organizations in EMEA have experienced an incident that resulted in data loss, integrity issues and service disruptions affecting business-critical applications in the last two years, while only a third (34%) of organizations hadn’t faced any incidents over the last 24 months that affected them.
It’s time for businesses to consider their organizational risk as a whole. Perimeter security alone is no longer enough, and businesses need to build up from the assumption that the hacker is already in. This means their security policies need to embed layered protection across all areas of the enterprise: from endpoints, on-premises and cloud security to SaaS and vaulting privileged accounts.
The message is clear: businesses should focus on minimizing the damage that can be done to key applications so they can continue to run seamlessly even in the event of a breach. The days of generic security policies are over.
Coping up with Digitalization in the FinTech Marketplace
Ed Adshead Grant, General Manager & Director-Payments, Bottomline Technologies
How Otis Elevator Co. creates personalized experiences with smart dispatching technology
Chris Bowler, Senior Director, Service Marketing and Strategy, Otis Elevator
Business Intelligence to Intelligent Business: The Importance of Data as a Strategic Asset
Tekin Mentes, Head of Enterprise Information Management, LeasePlan
Customer Experience-The New Differentiator
Ruth Crowley, VP of Customer Experience Design, Lowe’s Companies, Inc. [NYSE: LOW]