The SolarWinds Supply Chain Hack: What You Need to Know
Just when you thought we had the last major hack of 2020 with the FireEye incident last week, we have discovered just a couple of days later that it stemmed from a massive supply chain attack originating in the Orion network management software from SolarWinds, which affects many other organizations ... Read More
Protecting your network from vendors and other third parties
When looking to decrease your risk from your vendors and other third parties that access your networks and systems, look first to protecting your network. Outsourcing is a fact of life and you aren’t going to have fewer vendors needing access to your networks to do their job. However, (and ... Read More
Third-Party Risk Management: How to get your vendors on board
So you’ve finally stood up a proper third-party risk management (TPRM) program. You’ve got your vendors inventoried, their risks assessed and technologies selected to keep them on the straight and narrow. That was the easy part, believe it or not. Now, you’ve got to convince all your vendors (or any third ... Read More
Third-Party Risk Management: How to Get Your Vendors on Board
So you’ve finally stood up a proper third-party risk management (TPRM) program. You’ve got your vendors inventoried, their risks assessed and technologies selected to keep them on the straight and narrow. That was the easy part, believe it or not. Now, you’ve got to convince all your vendors (or any ... Read More
Looking forward to the 2021 cybersecurity landscape
Coming to the end of 2020, which has been a year of “unprecedented times,” impacted cybersecurity in a big way. With barely any time left in 2020, it’s time to look at what we think 2021 could bring. The main hope is that it will be a little less frantic ... Read More
Ransomware’s brutal ‘second wave’
Winter is coming and ransomware is well underway with a brutal second wave. And while some may call this just a natural evolution, there is no doubt that attacks are picking up steam and shifting to a far more aggressive and brutal mode. With the confirmed death of a patient in a hospital ... Read More
Ransomware’s Brutal ‘Second Wave’
Winter is coming and ransomware is well underway with a brutal second wave. And while some may call this just a natural evolution, there is no doubt that attacks are picking up steam and shifting to a far more aggressive and brutal mode. With the confirmed death of a patient ... Read More
Why efficiency and security are more important than ever for vendor access management
We’re not going to be dropping new information when we say that security is important when allowing network access to external parties like vendors and contractors. Along the same lines, breaches coming from third-party access are increasing as vendors often offer an easier way into your network than a full-frontal ... Read More
How the cloud could improve vendor access management
At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you are trying to provide access for third parties to internal systems, and whether it’s a VPN concentrator or a vendor privileged access management (VPAM) system, these devices typically sit inside or ... Read More
How the Cloud Could Improve Vendor Access Management
At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you are trying to provide access for third parties to internal systems, and whether it’s a VPN concentrator or a vendor privileged access management (VPAM) system, these devices typically sit inside ... Read More
