Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Blog Category - Cybersecurity

Cybersecurity, Risk Landscape

Cybersecurity Resources: Do Your Part

With less than one month to go until Cybersecurity Awareness Month, the National Cybersecurity Alliance hosted a conversation between Bryan Smith, Section Chief, Cyber Criminal Section, Federal Bureau of Investigation, and Mitchel Chang, SVP of Corporate Social Responsibility and Initiative...

Read More
Cybersecurity, Risk Landscape

Anatomy of an Attack: T-Mobile Hack Takeaways

As far as digital heists go, last week’s T-Mobile hack was about as complicated as a convenience store smash-and-grab, albeit one that exposed the personal data of 40 million-plus customers. In lieu of any ransom schemes, the stolen records of...

Read More
Cybersecurity, Risk Landscape

Cybersecurity vs. Information Security

You like potato and I like potahto You like tomato and I like tomahto Potato, potahto, tomato, tomahto. Let's call the whole thing off... --Ella Fitzgerald, Let’s Call the Whole Thing Off (featuring Louis Armstrong)   You say information security,...

Read More
Cybersecurity, Risk Landscape

Collected Thoughts: Ransomware Risk

This month, several Shared Assessments Industry Strategy and Working Groups came together in a cross vertical meeting, Ransomware: It Takes An Organization, to address ransomware threats.   Sophisticated ransomware attacks are being used with adjusted methods to strike supply chains...

Read More
Best Practices, Cybersecurity

Protecting Your Digital Supply Chain – Three Tips

In his 2001 book From Analogue to Digital Supply Chains Tony Hines coined the term “digital supply chain” to explain the electronic distribution of goods or services that had previously been supplied in physical form.  The digital delivery of media...

Read More
Cybersecurity, Risk Landscape

Ransomware and TPRM: Steps You Can Take Now

Ransomware attacks are dominating headlines. Solar Winds, JBS, Colonial Pipeline, and Kaseya VSA are household names not because of the products or services these organizations offer, but because of notorious cyberattacks against these organizations. Publicity aside, the $20 billion sum...

Read More
1 6 7 8 9 10 17