Recent trends indicate that it’s no longer enough to only address cybersecurity internally. Cybercriminals are rapidly advancing their tactics by targeting an organization’s third parties, vendors and suppliers – and it’s working.
In our 27-criterion evaluation of third-party risk management (TPRM) platform providers, we identified the 12 most significant ones — Aravo, Archer, Coupa, Diligent, LogicGate, LogicManager, MetricStream, NAVEX, OneTrust, Prevalent, ProcessUnity, and ServiceNow — and researched, analyzed, and scored them.
How to Plan When You Don’t Know What You Don’t Know.
In BitSight discovered six severe vulnerabilities in the MiCODUS MV720 GPS tracker, a popular automotive tracking device designed for vehicle fleet management and theft protection for consumers and organizations.
As businesses settle into the “new normal” of a riskier security environment, they need a more strategic approach to managing these risks, beyond just “check the box” compliance. Here are five best practices for achieving this goal.
In today’s ever-evolving security landscape, cyber risk is constantly increasing — making it critical for you to be able to effectively analyze your organization’s security performance over time. In a 2020 survey conducted by Harvard Business Review
Analytic Services, 74% of 168 executives named cyber risk as one of the top three risks their company faces today.
Black Kite retail and e-commerce infographic for the top 100 US retail companies.
In this white paper, you will learn a step-by-step process that will help you avoid ransomware attacks when working with vendors, suppliers, and other partners.