© Neil Daswani and Moudy Elbayadi 2021
N. Daswani, M. ElbayadiBig Breacheshttps://doi.org/10.1007/978-1-4842-6655-7_13

13. Technology Defenses to Fight the Root Causes of Breach: Part Two

Neil Daswani1   and Moudy Elbayadi2
(1)
Pleasanton, CA, USA
(2)
Carlsbad, CA, USA
 

In this chapter, we continue our discussion of technology defenses and cover fighting third-party risk, software vulnerabilities, unencrypted data, and inadvertent employee mistakes.

Mitigating Third-Party Risk

As we have seen in the first part of this book, many data breaches start with compromises at third parties. Virtually no organization can operate as an island, and virtually every organization relies on a number of third partiessometimes a few, sometimes a dozen, sometimes hundreds, ...

Get Big Breaches: Cybersecurity Lessons for Everyone now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.