How to Trust Your Service Provider

Service providers differ from suppliers, or those historically viewed as ?third party?. The differences are often subtle and hard to describe, but they bring with them very different challenges and risks to ...
VPAM

Why You Need PAM and VPAM in 2020

As IT and security managers begin to organize and submit their 2020 budget requests, privileged access management (PAM) or vendor privileged access management (VPAM) may be on the list of competing priorities ...
Security Boulevard
vendor management program

Setting Up a Vendor Management Program

Vendor management is a process or solution that allows organizations to optimize and secure the introduction and ongoing operations of third-party service providers into their business operations. An ideal platform provides centralized ...
Security Boulevard

Are You Really Cyber Aware?

Are you as prepared as you should be to manage digital risk and address new cybersecurity challenges? See what considerations you should make during National Cybersecurity Awareness Month ...
SecZetta Closes $10M Series A Funding

SecZetta Closes $10M Series A Funding

Art Coviello, former Executive Chairman of RSA, joins the board. SecZetta, provider of the most comprehensive non-employee identity risk and lifecycle management platform, today announced that it closed $10M in Series A ...
process

The Top Vendor Management Processes to Automate

Compliance, security and risk are three reasons why vendor management is becoming a vital task Managing vendor access into your network and systems is becoming a more critical job as news about ...
Security Boulevard

Digital Transformation: New Security Challenges & Renewed Call for Governance

Despite increased investment in security, the number of large-scale breaches continues to grow. PWC?s Paul O?Rourke weighs in on what organizations need to do to address the challenge of digital risk ...

Do You Know How Third Parties Really Impact Your Business Objectives?

You may think you know how third parties affect your organization?s risk profile. But there may be a lot you don?t know?like whether their third parties are adding to your risk, or ...

Real-Time Observations in Security Hygiene

The most recent breach is notable in that several missteps occurred. These missteps are good reminders of the importance of security hygiene in a hyperconnected world. Take a moment to review and ...

Driving Investment in Digital Risk Management

Do you know what goals and initiatives are most important to executives at your company? Do you know how to demonstrate success in language they?ll understand? Learn how to be a winner ...