Oppenheimer vs Hinton? - Digital Threat Digest

Every organisation is facing a myriad of third-party digital risks; whether that’s criminal-led (the most common), state-led, hacktivists or commercial espionage driven.
Most of us love data, especially when it gives us a sense of progress. I say this as a confirmed FitBit tragic who lives for yet another point on my ‘cardio fitness’ score.
At worst, information assurance consultancy can risk feeling like paying somebody merely to tell you what you already really know; or even performing work that, at least theoretically, you could do yourself.
When we help our clients with their cyber and information security, one area that we sometimes find neglected is identity and access management (IAM).
In short, the answer is no. According to the Hiscox Cyber Readiness Report, in the past year 65% of organisations “experienced one or more cyber-attacks as a result of a weak link in their supply chain”.
As best practice, being able to address security requirements with your critical service providers is consistently included in all of the major cyber security standards.