Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Blog Category - Cybersecurity

Cybersecurity, Risk Landscape

Trends in Ransomware: What to Know About RaaS

By now we’ve all heard of SaaS (software as a service) and many have heard of IaaS (Infrastructure as a Service), PaaS (Platform as a Service), or the term that contains them all: XaaS (anything as a service). The as-a-Service...

Read More
Cybersecurity, Risk Landscape

Spring4Shell – What the H…?

As numerous reputable security and analysis organizations continue to weigh the criticality of the recent Spring4Shell (aka: “SpringShell”) vulnerability, Shared Assessments has opted to take a neutral stance as to its prevalence and criticality. Regardless of this, it is crucial...

Read More
Cybersecurity, Risk Landscape, Supply Chain Risk

Current and Evolving Cyber & Supply Chain Risks

In a recent Fireside Chat presented by Shared Assessments Committees’ Leadership on “Current and Evolving Cyber & Supply Chain Risks,” conversation topics included Conti, CISA, the geopolitics of SWIFT payments, chip shortages, and how the war in Ukraine might influence...

Read More
Cybersecurity, Geopolitical Risk, Risk Landscape

The Cyber Side to the Russia-Ukraine Conflict

For the past few weeks, a worldwide audience has watched in fear and shock as war unfolds in the streets of Ukraine, causing thousands of casualties and deaths and displacing thousands of people. This is the bloody side of war,...

Read More
Cybersecurity, Risk Landscape

What’s Next For Cyber Warfare?

For the past few weeks, a worldwide audience has watched in fear and shock as the war unfolds in the streets of Ukraine, causing thousands of casualties and deaths and making many more refugees. This is the bloody side of...

Read More
Cybersecurity

How to Strengthen Cybersecurity Defenses

Where are the war-related cyber attacks? It’s an unnerving question that has information security and third party risk management (TPRM) professionals knocking on wood. There are several viable answers to the question, the most important of which may be that...

Read More
1 2 3 4 17