
Jul 23, 2020
3 min read
Top 5 Reasons Why Your Supplier Needs a Remediation Plan
Companies want to get down to business quickly, and that includes rapid onboarding of third parties. But often, hiring a new supplier requires a thorough security assessment to ensure that your security policies and standards are supported. What happens when you discover that a supplier you wish to do business with is not as secure as you would like it...

Jul 22, 2020
3 min read
The New Cyber Risk Rating: A Conversation with Panorays’ Chief Architect
Today, Panorays announced its release of the Cyber Risk Rating, a combined “bottom-line” rating of all of the cyber data available about a supplier on Panorays, including the Cyber Posture Rating, Smart Questionnaire™ Rating and business impact. Unique to Panorays, the Cyber Risk Rating enables security professionals to make quick decisions about their suppliers’ security. To shed some light on...

Jun 04, 2020
4 min read
The Top 5 Third-Party Data Breaches of 2020
The year is not even half over, and third-party data breaches continue to proliferate. In third-party data breaches, sensitive information belonging to an organization is compromised through a vendor, business partner or supplier. Such cyber events can be disastrous for organizations, which can lose customer confidence and loyalty and face hefty regulatory penalties. In fact, according to a recent Gartner...

May 21, 2020
5 min read
How to Achieve Cyber Resilience in 4 Steps
Cyber resilience is the ability to prepare for, respond to and recover from cyberattacks. This can include a set of policies and procedures that will help mitigate risk during normal operations within the processes and workflows of an organization. An organization with true cyber resilience can quickly get back to business as usual following any incident that is out of...

May 04, 2020
4 min read
5 Cloud Security Alliance Working Groups to Consider Joining
Founded in 2008, the Cloud Security Alliance defines standards, certifications and best practices to help ensure a secure cloud computing environment. It has over 80,000 members worldwide, and offers working groups across 31 domains of cloud security. These groups include participants from CSA’s diverse membership and provide the opportunity to participate in research initiatives with like-minded professionals. What are some...

Apr 30, 2020
4 min read
4 Reasons Why People Are Susceptible to COVID-19 Scams
As the coronavirus continues to wreak havoc on the world, cybercriminals are taking the opportunity to exploit individuals and businesses for personal profit. IBM E-Force reported a 6,000% increase in COVID-19 related spam, and lawmakers and the FBI are taking steps to address it. Unfortunately, many of these scams are succeeding: This month, the FTC reported that Americans reported more than $12 million in losses due to coronavirus-related fraud. ...

Apr 21, 2020
3 min read
3 Reasons Why Your Organization Should Perform an Enterprise Cybersecurity Risk Assessment
While it’s important to assess the cybersecurity of your third parties, there’s another crucial process that every organization should consider: An enterprise cybersecurity risk assessment, which provides an external view of your organization’s attack surface along with verification of internal security controls. Here are three key reasons why: Changing Times The cyber world is incredibly dynamic. Since new technologies are...

Mar 24, 2020
5 min read
The Future of Cloud Security: Challenges, Trends and Solutions
2020 is unquestionably the year of maturity for cloud storage solutions. Nearly a decade ago, the cloud was still a new idea and was only being used by startups. While cloud services are still not perfect, you can build better security today on the cloud than you can over your own premises, which is significant. Enterprises are now using more...

Mar 09, 2020
3 min read
Service Announcement: The Right Questions to Ask Your Vendors in Times of…
In the wake of coronavirus, companies are now applying immediate work-from-home policies. This sudden and massive change poses a set of new cybersecurity risks and is forcing security teams to take immediate action. One of these cybersecurity risks emanates from the supply chain. While a large company may be able to quickly undergo the transition from a relatively concentrated workforce...

Mar 08, 2020
5 min read
The Cybersecurity Ripple Effect of the Coronavirus
Coronavirus is affecting the economy, global supply chains, human and workforce behaviors. Many companies are now adopting work-from-home practices: Twitter, Amazon, Microsoft, Okta and more have already advised their employees to work remotely, and undoubtedly this list will continue to grow. These difficult times have introduced not just IT and company culture challenges, but also a ripple effect of cybersecurity...
Popular Posts

Feb 10, 2022
1 min read
The Most Common Third-Party Cyber Gaps Revealed
As organizations increasingly rely on third-party vendors to provide essential services, they also become more vulnerable to vendor related cybersecurity risks. A recent study by Forrester found that nearly 60% of companies experienced a data breach due to a third-party vendor in the past year. But what are the most common vendor cyber gaps that organizations should be aware of?...

Aug 26, 2021
3 min read
4 Ways to See if You Are at Risk of a Vendor…
Recent supply chain attacks such as Kaseya, Accellion and SolarWinds have illustrated that when it comes to vendor breaches, it’s not if, but when. While it’s impossible to predict cyberattacks, there are key steps that you can take with your vendors to determine if you might be at risk. Here are 4 key strategies: 1. Monitor security posture It’s important...

Jan 03, 2022
3 min read
5 Resolutions for Reducing Third-Party Cyber Risk in 2022
If there’s one thing we’ve all learned, it’s that supply chain attacks are not going away anytime soon. Last year, we saw major cyber incidents involving Accellion, Kaseya, Codecov and others; next year, there will certainly be more. To help prevent and respond to similar cyber incidents, it’s essential to consider how best to reduce third-party risk. How can this...