We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.

Blog

Learn about the latest research and happening in TPSRM
Get the latest vendor risk info and news to your inbox
Financial Services’ Playbook

The Financial Services’ Playbook For Managing Vendor Security Risk

The financial services industry faces a greater risk of a data breach than ever before. Greater connectivity…
Sales Security Blog

Verifiable Security Posture Can Help Shorten Sales Cycles

Sales Cycles During Economic Slowdowns Sales is difficult enough in the best of times. You need to learn your product or service, cull through leads and…
Lock

Third-Party Security Risk Management: A Critical Component of Your Risk Management Process

What is Third-Party Security Risk Management (TPSRM)? The terms vendor risk management (VRM) and third-party risk management (TPRM) are often used interchangeably. But they are actually…
Risks Folder

What is a Security Risk Assessment?

A security risk assessment (SRA) is designed to help you evaluate risk…
People watch through binoculars

What is a Third-Party Vendor and Why is…

A third party vendor is a person or company that provides services…
Anatomy of a Healthcare Data Breach

Anatomy of a Healthcare Data Breach

With lawsuits being filed following recent healthcare data breaches, companies must consider…
4 Key Steps to Your Third Party Risk Management Process

4 Key Steps to Your Third-Party Risk Management…

If you’re like most organizations, you are highly dependent on third-party vendors…
Risk Management

Why It’s Crucial to Have an IT Vendor…

What is IT Vendor Risk Management (VRM)? Think about all of your…
How to Approach Vendor Risk Management

What is Vendor Risk Management?

Vendor risk management includes various potential risks that your company may face…
Checklist

Vendor Due Diligence Checklists: A Critical Component of…

What Vendor Due Diligence Is and Why You Need To Do It…
Hand with mobile

Why You Need Vendor Risk Management Software in…

Why Is Vendor Risk Management Important? You‘ve taken all the necessary steps…
Atlassian

Responding to the Atlassian Vulnerability

On June 2nd, 2022, Atlassian announced a critical zero-day vulnerability caught in…
5 Best Practices

5 Best Practices for Protecting Sensitive Information Shared…

When you work with third parties, you often allow them access to…
Github Breach

Responding to the GitHub Breach

On April 15th, 2022, GitHub, a ubiquitous software development host owned by…

Popular Posts

Featured Authors

The Fastest and
Easiest Way to Securely
Do Business Together