Not All Third-Party Relationships are Created Equal

Not All Third-Party Relationships are Created Equal Third-party risk management programs require you to explore your businesses suppliers cybersecurity posture. It is no longer sufficient for businesses to only secure their internally-controlled infrastructure and services. You must also diligently evaluate the security policies and procedures of their third parties to reduce cyber risk. Organizations interact […]

Why You Should Take the Cyber Risk Scoring Challenge

Why You Should Take the Cyber Risk Scoring Challenge Simple, first generation products from cyber risk score vendors have been around for decades. They rely heavily on passive scanning—pulling data from public internet traffic—and suffer in terms of completeness and accuracy. The data from these products is typically captured solely from traffic analysis from various […]

7 Ways COVID-19 Will Permanently Reshape Cyber Security

7 Ways COVID-19 Will Permanently Reshape Cyber Security Many security projects—no matter how important—fade away, either due to budget limitations, scarce resources or lack of prioritization. However, the sudden shift to remote work due to the COVID-19 pandemic has pushed many of these initiatives to the forefront, and they are now gaining traction that should […]

Keys to Managing Your Third-Party Cyber Risk During a Pandemic

Organizations are increasingly partnering with an expansive network of third parties to extend and optimize their capabilities. By leveraging these external partners, organizations are better positioned to grow and compete in their respective markets. These third parties can be suppliers, contractors, vendors, business partners or joint ventures that organizations rely on to enhance their business […]

Coronavirus (COVID-19) and the Challenges Facing Cyber Security

Coronavirus (COVID-19) and the Challenges Facing Cyber Security By now, many experts agree that repercussions from the coronavirus will hit every organization on some level, no matter how resilient they thought they were. In fact, cyber security author Raef Meeuwisse has said that “no single event to date has changed the tech threat landscape more […]

Why You Need Next Generation Third-Party Cyber Risk Management

Why You Need Next Generation Third-Party Cyber Risk Management In this digital age, assessing cyber risk is critical to businesses of all sizes. And not just your organization’s direct risk level but those of all the third parties you do business with. This assessment is often surfaced through a score. Undoubtedly, that cyber risk score […]

5 Cyber Security Facts That Make You Think Twice

5 Cyber Security Facts That Make You Think Twice As the world has shifted from the physical to the digital, security threats have also changed from physical to cyber. The cyber risks are numerous, and the landscape evolves quickly. Juniper research states that cyber crimes accounted for $2 trillion in losses in 2019, and with […]

Addressing Vendor Risk Management Problems

Has your organization ever received phishing emails from a “trusted third party”? Have any of your affiliate businesses experienced a data breach? Most likely, the answer is “Yes” or “we don’t know.” In 2017, at least 56% of companies experienced a third-party breach (https://www.opus.com/ponemon/) In the ever-changing and dynamic cybersecurity landscape, organizations are constantly faced […]