Content Security Policy (CSP): Not Exactly a Magecart Vaccine

Content Security Policy (CSP): Not Exactly a Magecart Vaccine

With millions of buyers escalating their online activity ahead of Black Friday and the holiday season, it’s important for eCommerce websites and online businesses to combat Magecart and web-skimming issues in a ...
Tyler Technologies Reveals Ransomware Affected Some Internal Systems

Tyler Technologies Reveals Ransomware Affected Some Internal Systems

Tyler Technologies, Inc., revealed it suffered a ransomware attack that disrupted access to some of its internal systems. On September 26, Tyler Technologies published a statement on its website in which it ...

Off-Facebook Activity Tool, Ring App Third-Party Trackers, Wawa Credit Card Breach

In episode 106 for February 3rd 2020: What you need to know about Facebook’s new off-Facebook activity tool, details about the Ring Android app sending user data to third party trackers, and ...
S3 Partners With SecZetta to Address Third Party Identity Risk

S3 Partners With SecZetta to Address Third Party Identity Risk

NEWPORT, R.I. (PRWEB) JULY 15, 2019 SecZetta, the leading provider of third party identity risk and lifecycle management solutions, today announced that S3 has signed on to be a solutions partner bringing ...
SecZetta will Sponsor Navigate Austin – June 2019

SecZetta will Sponsor Navigate Austin – June 2019

NAVIGATE – The Identity Governance Conference The post SecZetta will Sponsor Navigate Austin – June 2019 appeared first on SecZetta ...
Are Third-Party Vendors Your Biggest Cybersecurity Risk? — CyberSpeak Podcast

Are Third-Party Vendors Your Biggest Cybersecurity Risk? — CyberSpeak Podcast

On this episode of the CyberSpeak with InfoSec Institute podcast, Fred Kneip, CEO of CyberGRX, discusses security risks for companies that work with third-party vendors — those both globally focused... Go on ...

The Challenges of Managing Third-Party Vendor Security Risk

It’s no longer enough to secure your own company’s infrastructure; you now must also evaluate the risk of third-party vendors and plan and monitor for breaches there, too. Data breaches are reported ...
Joe Goldberg

Become a Budget Hero, Use Third Party Maintenance for IT Assets

The first question you may be asking is, “Why should I be considering third party maintenance over OEM maintenance contracts?” The short answer: MONEY Most buyers who utilize third party maintenance services ...

The danger of third parties: ads, pipelines, and plugins

We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties. Categories: FYI ...
Facebook

The Shared Security Weekly Blaze – Mobile App Data Leaks, The California Privacy Act, Third-party Gmail Access

This is the Shared Security Weekly Blaze for July 2nd, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...