Outsourcing a 'major component' of two-thirds of IT security lapses

clock • 2 min read

Trustwave report highlights outsourcing as a major risk factor as many types of security software become increasingly ineffective

Outsourcing has been identified as a key attack vector in almost two-thirds of security investigations carried out by security services company Trustwave. The claim was carried in the company's ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
IT outsourcing costing Eurozone banks 'millions'

Outsourcing

ECB says issues ‘more severe and widespread’ than expected

clock 16 November 2023 • 2 min read
NSO's Pegasus spyware used to hack exiled Russian journalist

Hacking

Galina Timchenko led a media outlet Moscow declared ‘undesirable’

clock 14 September 2023 • 2 min read
We tried ChatGPT for vulnerability fixes. Most flaws are too complex for generative AI alone

Security Technology

An experiment with ChatGPT 3.5 found that 80% of code fixes were unusable or introduced new vulnerabilities

clock 12 July 2023 • 4 min read

More on Security

Interview: Accenture, Security Excellence Awards finalist

Interview: Accenture, Security Excellence Awards finalist

'Our focus is on delivering tangible value at speed and scale'

Computing Staff
clock 30 April 2024 • 5 min read
Interview: lllumio, Security Excellence Awards finalist

Interview: lllumio, Security Excellence Awards finalist

'Zero-trust segmentation is a foundational capability of any zero-trust strategy

clock 30 April 2024 • 1 min read
Interview: Zerto, Security Excellence Awards finalist

Interview: Zerto, Security Excellence Awards finalist

'We laser focus on disaster recovery, ransomware resilience and multi-cloud mobility'

clock 29 April 2024 • 4 min read