With over 85,000 third parties ingested and nearly 4,000 third parties assessed, CyberGRX is using this important data to inform the industry and organizations around the world of third-party risk insights and trends.
This white paper gives invaluable insight into topics such as:
Which industries are the most...
Based on the threats and tactics unleashed in 2020, cybersecurity promises to be a top-of-mind business risk for the next president to manage. Bill Swearingen of IronNet Cybersecurity reflects on a virtual roundtable discussion about what to expect over the next four years.
Glen Hymers, CISO and head of data protection at the U.K.-based charity Save the Children International, says adapting to a cloud-first environment requires extensive security measures, including automated monitoring.
IoT devices are like sausages: They're full of components of varying quality, and it's invariably disturbing to think about their origins. New guidance helps address how to reduce the risk of potentially vulnerable components in connected devices.
The market for IT vendor risk management tools includes products and services that automate processes in the vendor risk management life cycle.
CyberGRX has received the highest score for the second year in a row from Gartner for their VRM Solution with rich assessment data.
Don't just take our word for it, read...
The Cyber Risk Institute this week is releasing a new version of its "Cyber Profile" risk assessment framework for the financial services industry that includes expanded information on third-party risk and cloud security. Institute founder, Josh Magri, describes the updates.
Businesses must address third party risk or face the loss of hundreds of millions in third party data breaches. While exchanging information with organizations is the lifeblood of business, once data leaves your hands, it takes its own journey through your third parties and their suppliers, and so on. Your data is...
Businesses must address third party risk or face the loss of hundreds of millions in third party data breaches. While exchanging information with organisations is the lifeblood of business, once data leaves your hands, it takes its own journey through your third parties and their suppliers, and so on. Your data is...
Attackers have been actively exploiting a flaw in Rackspace's hosted email service to send phishing emails, bearing legitimate and validated domain names, as part of business email compromise scams, warns IT security testing consultancy 7 Elements. Rackspace tells customers it plans to fix the problem soon.
In some respects, government agencies enter the cybersecurity arena with one hand
already tied behind their backs. It's accepted: They are under great public scrutiny in terms
of their financial spending. They are challenged to recruit and retain qualified staff. And yet
they are still a favored target of...
The Office of the Comptroller of the Currency has fined Morgan Stanley $60 million for the investment bank's failure to properly oversee the decommissioning of several data centers, putting customer data at risk of exposure.
The world of third-party risk management is rapidly changing. Each day, organizations like yours face new security, privacy, and compliance threats when working with third parties. The good news is there are world-class teams around the world that are paving the way with new best practices for the next generation of...
A hybrid workforce, heightened insider risk, 5G concerns over the expanded attack surface - these are the "more" that people reference when they talk about "doing more with less" in 2021. A CEO/CISO panel discusses how security leaders prioritize budget allocations for these concerns.