Risk Management Blog and Articles

August 12, 2022
netskope cci feature release thirdpartytrust

Measuring enterprise readiness of your cloud service vendors

ThirdPartyTrust is introducing Netskope CCI and CCL indicators to assess your cloud vendors and mitigate risk to your organization.
August 11, 2022
cisco cyberattack

Cisco Hit by Cyberattack Via Compromised Employee Google Account

Attackers gained access to a Cisco employee’s VPN client via compromised credentials from their Google account.
August 8, 2022
twitter zero day vulneravility

Zero day vulnerability exposed data of 5.4 million Twitter accounts

The zero day vulnerability allowed cybercriminals to retrieve data associated with Twitter accounts. Here's what you need to know.
August 4, 2022
thirdpartytrust-acquisition-bitsight

ThirdPartyTrust Announces Acquisition by BitSight

With ThirdPartyTrust joining the BitSight family, we offer an unequaled end-to-end TPRM solution that will strengthen vendor risk management.
August 1, 2022
cost of a data breach

What’s the cost of a data breach in 2022?

The latest Cost of a Data Breach Report provides insights into the financial impact of data breaches. Here’s what you need to know.
July 28, 2022
shadow it tips - managing shadow it

5 Tips for Managing Shadow IT

As employees work remotely, organizations need to minimize their blindspots. Make managing Shadow IT your first step.
July 25, 2022
shadow it and remote work

Remote Work and Shadow IT – How to securely support WFH policies

Does increased remote work mean increased risk? These are the areas you need to secure to prevent Shadow IT issues in remote work.
July 21, 2022
shadow it stats

15 Eye-Opening Shadow IT Stats You Need To Be Aware Of

The use of unsanctioned technology is growing rapidly. To thrive in this environment, you need to be aware of these Shadow IT stats.
July 19, 2022
building a shadow it policy

Building a Shadow IT Policy: What CEOs, CTOs, and CISOs Need to Know

As businesses move to the cloud and remote workers try to get things done, a Shadow IT policy is imperative to reduce risk.