Companies like yours spend millions of dollars each year assessing and mitigating threat vectors within the company. But when it comes to the management of third-party cyber risks, management and tracking typically follow archaic and highly manual processes. Despite its complexity, vendor risk management doesn't...
The old demarcation lines of cybersecurity responsibility have been erased. In this new landscape, risk surface is the unforeseen undercurrent of high velocity digital business.
"Risk Surface Management" is a revolutionary shift in third-party risk management. It's an approach to self-reporting on third-party risk...
Distributed denial-of-service (DDoS) attacks are increasingly complex and they frequently employ multiple attack types and strategies such as multivector and diversionary attacks against a broad set of targets. Industry reports continue to illustrate that no one organization is safe.
Even though DDoS prevention...
Third-party breaches remain a dominant security challenge for organizations, with over 63% of breaches linked to a third party. Clearly, both organizations and their third parties are wasting critical financial and human resources on programs that aren't optimized to help them reduce cyber risk in their shared...
One important outcome of digital transformation is an explosion of interconnectivity between organizations and the wide availability of third-party capabilities.
But this transformation is not completely without cost. Third parties (and even fourth parties) can become dependencies for critical business functions....
"How secure is your supply chain?" It's a question that can strike terror into the heart of a CISO - even one who's in charge of a mature security organization.
Download this guide on assessing third-party risk and learn how to:
Be realistic about who chooses who you do business with;
Create a questionnaire and...
For many, cost-effective scalability usually means outsourcing some or all of your business functions to a complex web of third-party vendors.
The Third-Party Risk to the Nth Degree whitepaper provides quantitative and contextual measures by which your organization can compare current practices and investment to help...
The FDA is generally on the right track in updating guidance for the cybersecurity of premarket medical devices. But a variety of changes are needed, say some of the healthcare sector companies and groups that submitted feedback to the agency.
The risks posed to enterprises managing third parties have evolved. Increasing reliance on third-party vendors, new privacy regulations, shifting cybersecurity threats, and frequent data breaches have upended the third-party risk landscape. As a result, modern risk solutions must adapt to solve both security and...
More than ever before, companies are investing heavily in their organization's security. But as the threat landscape changes, how do you know that these investments in security are paying off - and how can you determine that you are investing the appropriate amount of security spending in the areas that matter most to...
Software Applications are one of the more challenging types of log sources you will integrate into your enterprise logging strategy, but they are also one of the most important.
The more awareness you have into what's happening in your environment, the more calculated actions you can take to mitigate risk.
Download...
While Office 365® offers a significant and useful set of productivity, collaboration and other services, it is not the only solution that most organizations will need to satisfy their archiving, data security, encryption, and in particular, their e-discovery requirements.
Download this detailed Osterman Research...
Yet another cyberattack against a cloud-based electronic health records vendor has been revealed. This one involved a ransomware attack that potentially exposed data on 16,000 patients of a California eye clinic. What can healthcare organizations do to minimize vendor risks?
As of March 1, 2019, the two-year transition comes to an end, and covered entities are required to be in compliance with the New York Department of Financial Services Cybersecurity Regulation Section 500.11, the Third Party Service Provider Security Policy. What are the key requirements of this section, and how might...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.