Risk Management Blog and Articles

April 7, 2022

What is a Zero Day Exploit?

Newly found vulnerabilities are only successful when attackers use exploits to leverage them. So what is a zero day exploit?
March 31, 2022

What is due diligence in third party risk management?

When assessing third party risk, one term usually comes up: due diligence. What is due diligence and how does it relate to vendor management?
March 29, 2022

TPRM and NIST Framework – Everything you need to know

Third party risk management and NIST: Learn how to evaluate vendor compliance with security, regulatory, and privacy requirements.
March 24, 2022

Okta suffers third party data breach: Preventing supply chain attacks

The Okta breach put businesses on high alert. We explore the threat to Identity and Access Management solutions and third party risk.
March 23, 2022

TPRM integrations: Using vendor risk data in your business decisions

Get the most out of your technology stack by integrating your vendor management into every business process with these TPRM integrations.
March 22, 2022

What is a third party data breach?

What is a third party data breach or supply chain attack? Learn how to prevent one with third party risk management practices.
March 16, 2022

Improving user management in your vendor risk assessments

Are you manually managing permissions at each third party vendor connection? Learn how to make user management easier and scalable.
March 10, 2022

Are passwords important to vendor risk management tools?

Passwords are the vulnerable front door to a company’s data. How should credential security be a part of third party risk management?
March 1, 2022

7 reasons to use a Third Party Risk Management tool

How many repetitive tasks are involved in your risk assessments? Here’s how a third party risk management tool can make them more efficient.