Only one-third of organizations feel their processes for third-party risk management are effective. The root of the issue lies in visibility and ineffective process.
Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more.
Researchers speculated that poor supply chain security could be to blame for a new malware campaign that targets insecure USB drives to infect Windows machines.
When it comes to vendor security, all the handshakes and paperwork that go into a business deal tend to get in the way of proper audits and thorough vulnerability assessments.
Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors.
There is no such thing as a magic bullet for security. When security vendors push their products too hard, customers grow skeptical of the entire industry.
When donors finish giving blood, they’re often handed some sweet treats, like cookies or juice, to help get them back to full strength. But for the Australian Red Cross, the end of October 2016 comes with not-so-funny tricks along with those...
While most third-party vendor connections are harmless and well-intentioned, they can act as footholds for attackers to gain access to your network.
Organizations must hold third-party vendors, partners and service providers accountable for the role they play in ensuring the enterprise's security.