cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
akkem
Contributor III

JPMC's CISO open letter to Third-Party suppliers

JPMC's CISO posted an open letter, while they are always areas of focus, expect questions to be raised around:  stolen authentication tokens, software gaining privileged access without consent, and hidden fourth-party dependencies

 

  • Software providers must prioritize security over rushing features. Comprehensive security should be built in or enabled by default.
  • We must modernize security architecture to optimize SaaS integration and minimize risk.
  • Security practitioners must work collaboratively to prevent the abuse of interconnected systems.

 

https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers

 

2 Replies
mvl
Newcomer I

With rapid changes in IT and cloud environments, a shift-left approach is essential to embed security early in the development lifecycle and address risks proactively.
unknownop00
Newcomer I

De open brief van JPMC’s CISO aan third-party leveranciers benadrukt één ding: veiligheid en betrouwbaarheid zijn geen luxe, maar noodzaak. Dat geldt ook voor je website. Als je een website laat maken bij SuccesvolWebdesign.nl, zorgen we voor een veilige, Webdesign bureau stabiele en professionele online omgeving die voldoet aan de eisen van vandaag – ook die van jouw klanten.