Risk Management Blog and Articles

August 29, 2022

Password manager LastPass Compromised: Source Code Was Stolen

Attackers gained access to the development environment through a compromised developer account. What does this mean for LastPass users?
August 12, 2022

Measuring enterprise readiness of your cloud service vendors

ThirdPartyTrust is introducing Netskope CCI and CCL indicators to assess your cloud vendors and mitigate risk to your organization.
August 11, 2022

Cisco Hit by Cyberattack Via Compromised Employee Google Account

Attackers gained access to a Cisco employee’s VPN client via compromised credentials from their Google account.
August 8, 2022

Zero day vulnerability exposed data of 5.4 million Twitter accounts

The zero day vulnerability allowed cybercriminals to retrieve data associated with Twitter accounts. Here's what you need to know.
August 1, 2022

What’s the cost of a data breach in 2022?

The latest Cost of a Data Breach Report provides insights into the financial impact of data breaches. Here’s what you need to know.
July 18, 2022

Google Fixes Zero Day Exploit In Chrome

Google Chrome was struck by a zero day attack for the fourth time in 2022, and Google is urging users to upgrade their browsers.
July 12, 2022

State of Ransomware: More Attacks and Higher Payments

The State of Ransomware 2022 report reveals an increasingly challenging threat environment and a growing financial and operational burden.
June 15, 2022

What is Shadow IT and how does it affect your digital supply chain?

When the Shadow IT issue arises, the latest integration between ThirdPartyTrust and Netskope becomes essential to increase visibility.
June 8, 2022

ThirdPartyTrust and Netskope Integration: Scaling TPRM with Intelligence

The ThirdPartyTrust and Netskope integration elevates network monitoring, reduces Shadow IT, and automates impact scoring. See how it works.