Manufacturers rely on vendors that might develop vulnerable components. So who’s in charge of securing IoT devices and minimizing this third-party risk?
A ransomware attack against a vendor of a fund administrator exposed data of investors. We analyze how a TPRM program can help prevent a Third-Party Data Breach like this.
We look at the latest DBIR through the lens of third-party risk and how it relates to the 43% of breaches that involve web applications.
We explore the benefits of having risk management operations planned, built, and run as a service, through the combination of a purpose-built tool with technical expertise.
We discuss switching to a process automation & workflow management platform like ThirdPartyTrust with our customers at Dover Corporation.
In Utilities, there’s a saying that “Safety is everybody’s business”. At some level, cybersecurity is becoming a part of everyone’s job too.
A consistent scoring system for quantifying your TPRM program will improve decision-making, enhance visibility, and demonstrate the value of your strategy.
As of October 1st, 2020 energy organizations will have to focus on addressing specific third-party cybersecurity risks. This blog looks at some key points of the standard and how TPRM technology can help complyi.
Here are five common mistakes to avoid along with our tips for building the TPRM program in a way that best serves your organization and the people who work within it.
Tone at the top is critical. Here are seven tips for obtaining and maintaining the support you need from the C-suite