Risk Management Blog and Articles

October 4, 2022

VRM and TPRM: What’s the difference?

We compare VRM and TPRM in the context of understanding and reducing the inherent risk of dealing with vendors and third parties.
September 27, 2022
shadow it risks

5 Shadow IT Risks to Address

The use of unsanctioned technologies can create different types of Shadow IT risks. Here's how to keep your network safe.
September 20, 2022
embracing-shadow-it-blog

Should You Embrace Shadow IT?

While expanding the attack surface, Shadow IT can be both a risk and an opportunity for IT and security leaders. Here's why.
September 19, 2022
shadow it tips - managing shadow it

5 Tips for Managing Shadow IT

As employees work remotely, organizations need to minimize their blindspots. Make managing Shadow IT your first step.
September 13, 2022
shadow it stats

15 Eye-Opening Shadow IT Stats You Need To Be Aware Of

The use of unsanctioned technology is growing rapidly. To thrive in this environment, you need to be aware of these Shadow IT stats.
September 9, 2022
cybersecurity education industry

Cloud-Based Attacks Targeting the Education Industry

47% of institutions in the education industry suffered a cyberattack on their cloud infrastructure within the last year. These tips can help.
August 31, 2022
top 5 cybersecurity stories

Top 5 Cybersecurity Stories of the Summer

Attackers gained access to the development environment through a compromised developer account. What does this mean for LastPass users?
August 29, 2022
lastpass compromised security incident

Password manager LastPass Compromised: Source Code Was Stolen

Attackers gained access to the development environment through a compromised developer account. What does this mean for LastPass users?
August 24, 2022
Cybercrime Across the U.S.

Cybercrime Across the U.S.

A new report from ThirdPartyTrust reveals which states in the U.S. have the most cybercrime, how many Americans have fallen victim, and how much money they lost.