Third-Party Cyber Risk Management: Automating Product and Service Specific Assessments
Tips for automating your third-party cyber risk management program that focuses on in-scope products and services.
FortifyData’s Alignment with NIST SP 800-40
NIST SP 800-40 is a “Guide to Enterprise Patch Management Planning” that helps to provide structure to the organizational process of patch management.
How Old Vulnerabilities Introduce Zero-Day Risks
Zero-day risks from bad vulnerability management allows previously reported vulnerabilities to reappear as new.
You Can’t Patch What You Can’t See (Why Asset Discovery is an Essential Piece of Vulnerability Management)
The first step in effective vulnerability management is effective asset discovery — identifying and mapping all the assets in your environment.
5 Ways to Protect Your Company Against Ransomware
It is critical that organizations prioritize defending their networks against ransomware attacks. Find out how.
Cybersecurity Risk Assessment Basics
About the Author: Anthony Ortega has more than 20 years of experience in cybersecurity, configuration management, systems engineering, and project management. He is currently nearing completion of his doctor of management in information systems technology degree.
Selecting a Third-Party Risk Management System That Fits Your Business
Selecting a third-party vendor risk management system is essential in today’s market. Learn why and how to do it.
Cyber Attacks: The New Snow Day
3 Ways to Prevent Third-Party Cyber Security Risk
Third party cybersecurity risk strategy can learn from the ways to stop COVID-19 – that is to prevent the spread of cyber attacks from other companies. Learn more.