Third-Party

Effective Third-Party Risk Management Under PCI DSS 4.0
The Payment Card Industry Data Security Standard (PCI DSS) aims to improve credit, debit and cash card transaction security and protect cardholders from breaches of their personal information ...
Security Boulevard

Supply Chain Cyberattacks are on the Rise – Here’s How U.S. Businesses can Fortify Their Defenses
The management of vendor and third-party risks is emerging as the number one challenge among U.S. information security professionals ...
Security Boulevard

Beyond Checklists: The Rise of Automated Vendor Assessment and Enhanced Security
As cyberthreats continue to increase, automation and proactive measures will be essential for mitigating the risks associated with third-party relationships and safeguarding valuable data and infrastructure ...
Security Boulevard

CSC Report Highlights Cybersecurity Threats .AI Domains Pose
Almost half of of Forbes Global 2000 companies do not have control over their branded artificial intelligence (.AI) domain names ...
Security Boulevard

Third Party Lets Pepsi Data Out of the Bottle, PII Nicked
Current and former contractors and employees at Pepsi Bottling Ventures LLC (PBV) were victims of a security incident that exposed their personal information ...
Security Boulevard

Should You Have Security Concerns When Partnering With a Third Party?
When it comes to business operations, it would be nice if we could house everything neatly under one roof. But unless you have the financial muscle of a global corporation like Ford ...
Security Boulevard
The Gig is Up! And that’s Not All Good
Kellie Arbuckle | | DTEX i3 Team, Dtex Systems, employee behavior, employees, Insider Risk Management, intent, intercept, Remote Work Security, research, Third-Party, work from home, Workforce Cyber Intelligence
This is the time of year when everyone is looking for little extra cash to pay off a few holiday bills or a trip to a warm-weather locale. In today’s digital economy, ...
New CISA Guidance Falls Short on Client-Side Software Supply Chain Security
Although the guidance mentions using a Software Bill of Materials at least eight times throughout its 45 pages, it fails to adequately address the widespread use of third, fourth, fifth, and even ...

Third-Party Risk in the Cloud
The term third-party risk applies to all risks introduced by external parties into an ecosystem, supply chain or infrastructure. Common third parties include vendors, partners, suppliers, service providers or contractors with access ...
Security Boulevard
GDPR and Website Data Leakage:A Complex Problem With a Simple Solution
By Source Defense Now in its fourth year, the European Union’s General Data Protection Regulation (GDPR) is one of the strictest, most complex, and most confusing data privacy laws in the world ...