InfoSec risk management, third-party

Assessing Third-Party InfoSec Risk Management

Companies across multiple industries are outsourcing many of their operations to reduce costs, increase scalability and streamline operations. Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency ...
Security Boulevard

Software Supply Chain Security Risks, Part 1 

It cannot be stated enough that software supply chain security risks are serious as organizations are so dependent on the software supply chain, an attack could cripple their business. The effects of ...
supply chain, SBOM, cybersecurity, SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

Third-Party Breaches Impact Vast Majority of Organizations

Third-party breaches are extremely common and impact the vast majority of organizations, suggesting an attack surface spans beyond just the technology that an organization owns or controls. These were among the chief ...
Security Boulevard

What You Need to Consider For Managing Third-Party Risk

Managing third-party risk is not a high priority, Forrester data finds. And that’s concerning. Juggling was a skill that organizations in the public and private sectors found themselves having to learn in ...
SEC business, risk, cyber, CRQ, TPRM risk management register

Third-Party Risk Management Efforts Remain Lackluster

Despite calls to re-shore and streamline supply chains during the great availability disruptions caused by the COVID-19 pandemic, enterprises are still increasing their reliance on third parties. They’re doing so to optimize ...
Security Boulevard
Preserve IP and PII With Dynamic Governance Over External Workflows

Preserve IP and PII With Dynamic Governance Over External Workflows

Internal file threats entail a breach of sensitive information from secure content stores to unauthorized third parties. To prevent them, you must ensure that all sensitive files are saved to the correct ...
Control Third-party Communication Apps to Protect Your Third-party Workflows

Control Third-party Communication Apps to Protect Your Third-party Workflows

Much like a busy office building with employees and guests coming and going, it’s impossible to monitor all information leaving and entering your organization. Everyday third-party communication apps, such as email, shared ...
AoID

Solving the 3rd Party Access Gap in Identity

The post Solving the 3rd Party Access Gap in Identity appeared first on SecZetta ...

Have Identity Professionals Lost Their Perspective on Risk Mitigation?

It’s a fact: The majority of larger cybersecurity incidents are related to an identity compromise. Yet most identity professionals don’t identify as risk mitigation professionals and are instead focused on ... The ...
New call-to-action

Entertainment & Media – The Next Big Cyber Attack Target?

On November 24, 2014, Sony Pictures employees discovered that the company’s network had been hacked. Attackers stole terabytes of data, deleted the originals off computers, and threatened to release the information they ...