Third-party providers are now essential to enterprise security — but how can organizations manage the growing threat of third-party risk?
While risk assessment is a regular topic of conversation today, when it comes to practicing good risk estimations and decisions in our daily lives, humans have some serious shortcomings.
Researchers observed an attack campaign exploiting CVE-2019-2725 and abusing certificate files to deliver a Monero miner.
The new BlackSquid malware is capable of abusing eight notorious exploits in its attempts to install the XMRig Monero miner.
Businesses need to adopt a strategic approach to managing third-party risks that provides an integrated view of the vendor relationship process.
Only one-third of organizations feel their processes for third-party risk management are effective. The root of the issue lies in visibility and ineffective process.
A new variant of the Emotet banking malware is using compromised connected devices as first-layer command-and-control (C&C) servers.
If we focus on the future at the expense of performing risk assessments to maintain defenses against existing threats, we will always be one step behind attackers.
More than 100 unique exploits of a WinRAR bug have been identified since security researchers discovered a 19-year-old vulnerability in the file compression system.
In 2018, data protection became top of mind for organizations around the world. What lessons can we draw from to help improve regulatory compliance, data breach protection and risk management in 2019?