Third-Party
CSC Report Highlights Cybersecurity Threats .AI Domains Pose
Almost half of of Forbes Global 2000 companies do not have control over their branded artificial intelligence (.AI) domain names ...
Security Boulevard
Third Party Lets Pepsi Data Out of the Bottle, PII Nicked
Current and former contractors and employees at Pepsi Bottling Ventures LLC (PBV) were victims of a security incident that exposed their personal information ...
Security Boulevard
Should You Have Security Concerns When Partnering With a Third Party?
When it comes to business operations, it would be nice if we could house everything neatly under one roof. But unless you have the financial muscle of a global corporation like Ford ...
Security Boulevard
The Gig is Up! And that’s Not All Good
Kellie Arbuckle | | DTEX i3 Team, Dtex Systems, employee behavior, employees, Insider Risk Management, intent, intercept, Remote Work Security, research, Third-Party, work from home, Workforce Cyber Intelligence
This is the time of year when everyone is looking for little extra cash to pay off a few holiday bills or a trip to a warm-weather locale. In today’s digital economy, ...
New CISA Guidance Falls Short on Client-Side Software Supply Chain Security
Although the guidance mentions using a Software Bill of Materials at least eight times throughout its 45 pages, it fails to adequately address the widespread use of third, fourth, fifth, and even ...
Third-Party Risk in the Cloud
The term third-party risk applies to all risks introduced by external parties into an ecosystem, supply chain or infrastructure. Common third parties include vendors, partners, suppliers, service providers or contractors with access ...
Security Boulevard
GDPR and Website Data Leakage:A Complex Problem With a Simple Solution
By Source Defense Now in its fourth year, the European Union’s General Data Protection Regulation (GDPR) is one of the strictest, most complex, and most confusing data privacy laws in the world ...
Ecommerce, Digital and Marketing Teams in the Security and Privacy Crosshairs
Looking for new tools and partners to enhance user experience, collect visitor analytics, engage prospects and customers through chatbots or advertising, automate information request forms, and process credit cards, among many other ...
Teen Mastermind Behind Lapsus$ Ransomware Attacks
Just when it looked like a tired hacker stereotype was fading, it seems that a teenager orchestrated Lapsus$ attacks against high-profile targets like Microsoft and Nvidia—all from the comfort of the home ...
Security Boulevard
Cybersecurity in 2022 and Beyond
Tripwire Guest Authors | | 2022, Compliance, data, Featured Articles, Gartner, standards, Third-Party
It’s that time of year that the usual happens. Christmas crackers with bad jokes. Holiday specials on TV (constantly). And cyber specialists like me make predictions about the year to come. With ...