Risk Management Blog and Articles

September 20, 2022
embracing-shadow-it-blog

Should You Embrace Shadow IT?

While expanding the attack surface, Shadow IT can be both a risk and an opportunity for IT and security leaders. Here's why.
September 13, 2021
Software Vendor Case Study

Software Vendor Case Study: Accelerating the Response to Security Reviews

This vendor was constantly hit with 200-question assessments, so they needed a scalable way to share their security posture with their customers.
July 12, 2022
state of ransomware

State of Ransomware: More Attacks and Higher Payments

The State of Ransomware 2022 report reveals an increasingly challenging threat environment and a growing financial and operational burden.
November 16, 2021
ransomware in europe

State of Ransomware in Europe: RaaS and Multiple Extortion Schemes

As organizations digitize and shift to online solutions, cybercriminals adapt. Get the latest research on ransomware in Europe.
November 8, 2021
webinar-stolen-credentials-ransomware

Stolen Credentials: A Conduit for Ransomware Into the Supply Chain

Attackers usually don't break in, they log in. Learn how to close the gap of stolen credentials to prevent ransomware in your supply chain.
April 15, 2021
story of thirdpartytrust

From Entrepreneur to CEO: How to be the wearer of many hats

Tired of gigantic spreadsheets with security questions, I set out to fix third-party risk assessments. This is the story of ThirdPartyTrust.
February 7, 2020

Take-Two Case Study: Assessments Take a Week Less with ThirdPartyTrust

Learn how Take-Two overcame its third-party risk management challenges with the ThirdPartyTrust platform.
January 9, 2020
what is inherent risk

Vendor Inherent Risk and What it Means to Your Third Party Risk Management

Inherent risk takes into account how a company is using their third-parties and what risk do they pose to the organization. Here's how to calculate it.
December 13, 2019

Designing your Third-Party Risk Management program: key essentials

ThirdPartyTrust COO shares some key points you need to take into consideration when creating a framework for your third-party risk management program.