As the software world evolves, more and more companies rely on 3rd party applications and software components as part of their infrastructure. However, this approach does not come without risks.
The implementation of 3rd party applications has its advantages, chief among them shortened development time frames and increased software maturity. Despite these obvious benefits, organizations must remain aware of potential security implications. This presentation will:
- Explain how 3rd party software vulnerabilities might lead to a data breach
- Deliver examples of incidents and how they occur
- Discuss the effectiveness of patching