Third Party Risk

Do You Know What Your Assets Are?
Jim Broome | | Asset Awareness, cybersecurity policy, Data Security, Incident Response, Third Party Risk
Asset awareness is the first step in understanding your complete security posture. If you don’t know what assets you own, how can you protect them? ...
Security Boulevard

Visualize Everyday Workflow Threats to Prevent Data Breaches
Do you know where your organization keeps its PII, PHI or other IP? Are they on-premise or in the cloud? Do you know who has access to them? Are all of your ...
Why Third-Party Insider Risk is an Overlooked Threat
Christopher Burgess | | CrowdStrike, Dtex Systems, employee behavior, insider risk, Insider Risk Management, Remote Work Security, Supply Chain Risk, Third Party Risk
Businesses have any number of people with access to their network at any given time. They have employees, yes. But they also have vendors, partners, contractors, and others – all with varying ...

Eliminate Shadow IT With Secure Content Access That Doesn’t Slow Workflows
Securing sensitive data cannot sacrifice the simplicity of sharing it, otherwise users will circumvent the security. Users expect easy online access to the sensitive information they need to get work done. For ...

Ransomware Protection in the Age of WannaCry: How to Limit the Impact of an Infection and Speed Recovery
If you read IT security news (or, quite frankly, any news at all), you’re familiar with the global WannaCry ransomware attack that was launched recently. It’s a sobering lesson in the value ...

Detect Anomalous Activity Ahead of a Data Breach With Heuristics
No one knows your business better than you. You know when it looks normal or when it looks strange. If you don’t have an office in Shanghai, then why are there multiple ...

Assessing Third-Party InfoSec Risk Management
Companies across multiple industries are outsourcing many of their operations to reduce costs, increase scalability and streamline operations. Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency ...
Security Boulevard
Software Supply Chain Security Risks, Part 1
rezilion | | Log4j, software supply chain attacks, Software Supply Chain Security Risks, Third Party Risk, Uncategorized, Vulnerability Management
It cannot be stated enough that software supply chain security risks are serious as organizations are so dependent on the software supply chain, an attack could cripple their business. The effects of ...

Third-Party Breaches Impact Vast Majority of Organizations
Third-party breaches are extremely common and impact the vast majority of organizations, suggesting an attack surface spans beyond just the technology that an organization owns or controls. These were among the chief ...
Security Boulevard
What You Need to Consider For Managing Third-Party Risk
rezilion | | dynamic sbom, SBOM, software bill of materials, software supply chain risk, Third Party Risk, Uncategorized
Managing third-party risk is not a high priority, Forrester data finds. And that’s concerning. Juggling was a skill that organizations in the public and private sectors found themselves having to learn in ...