Third Party Risk
Software Supply Chain Security Risks, Part 1
It cannot be stated enough that software supply chain security risks are serious as organizations are so dependent on the software supply chain, an attack could cripple their business. The effects of ...

Third-Party Breaches Impact Vast Majority of Organizations
Third-party breaches are extremely common and impact the vast majority of organizations, suggesting an attack surface spans beyond just the technology that an organization owns or controls. These were among the chief ...
What You Need to Consider For Managing Third-Party Risk
Managing third-party risk is not a high priority, Forrester data finds. And that’s concerning. Juggling was a skill that organizations in the public and private sectors found themselves having to learn in ...

Third-Party Risk Management Efforts Remain Lackluster
Despite calls to re-shore and streamline supply chains during the great availability disruptions caused by the COVID-19 pandemic, enterprises are still increasing their reliance on third parties. They’re doing so to optimize ...

Preserve IP and PII With Dynamic Governance Over External Workflows
Internal file threats entail a breach of sensitive information from secure content stores to unauthorized third parties. To prevent them, you must ensure that all sensitive files are saved to the correct ...

Control Third-party Communication Apps to Protect Your Third-party Workflows
Much like a busy office building with employees and guests coming and going, it’s impossible to monitor all information leaving and entering your organization. Everyday third-party communication apps, such as email, shared ...

Solving the 3rd Party Access Gap in Identity
The post Solving the 3rd Party Access Gap in Identity appeared first on SecZetta ...
Have Identity Professionals Lost Their Perspective on Risk Mitigation?
It’s a fact: The majority of larger cybersecurity incidents are related to an identity compromise. Yet most identity professionals don’t identify as risk mitigation professionals and are instead focused on ... The ...

Entertainment & Media – The Next Big Cyber Attack Target?
On November 24, 2014, Sony Pictures employees discovered that the company’s network had been hacked. Attackers stole terabytes of data, deleted the originals off computers, and threatened to release the information they ...

Assessing Cyber Readiness for 2022
Assessing your cyber readiness every year is vital to ensuring that your network, applications, and systems have the appropriate protections in place. As we flip the calendar ahead into 2022, performing your ...