Blog

poker credential stuffing attack

Poker Credential Stuffing Attack

by Mark Rudio | April 25, 2022 | Cyber Crime, Cyberattacks, Data & Cybersecurity, Hacking

Automated brute force attacks, also known as automated threats, are growing increasingly sophisticated. The Open Web Application Security Project (OWASP) currently lists 21 different methods of automated threats used by cybercriminals to hack into user accounts, ranging from CAPTCHA Defeat, which us ....

Protecting Data Center Infrastructures

Protecting Data-Center Infrastructures

by Kristen Hicks | April 25, 2022 | Data & Cybersecurity, Data Protection

We tend to think of the internet as mostly existing in the ether or “cyberspace,” but the online systems we depend on are tied to physical structures. And the physical side of your technology brings its own set of risks. When considering risk and vulnerabilities, many companies think first of ....

Earth Day

Top 5 ESG Resources for Earth Month

by Gary Roboff | April 20, 2022 | Environmental Social Governance (ESG), Third Party Risk Management

Every April, we mark the anniversary of the birth of the modern environmental movement: Earth Day. The first Earth Day, April 22, 1970, "was a day for learning and expressing concern, not for protesting — a big news event, but one with little of the drama and tension" as reported by the New York ....

Earth

Geopolitical ESG Fallout

by Vivian Nguyen | April 19, 2022 | Third Party Risk Management

The geopolitical impact of ESG (environmental, social, and governance) has been out of the spotlight. The recent Russia-Ukraine crisis has changed that reality. In our recent Russia-Ukraine Conflict: Geopolitical ESG Fallout Webinar panelists explored the short and long-term consequences of signi ....

standardized assessment tool

Standardized Assessment Tool

by Eric Krell | April 19, 2022 | Risk Assessment, Third Party Risk Management, Tools & Templates

If a group of risk professionals and their third party partners wound up at a karaoke bar at a certain hour, they might select a classic Stones tune for a heartfelt duet: “My back is broad, but it’s a-hurting,” the third party professional would croon. “I’ll never be your beast of burden, ....

6 1

Everyday Behaviors and Cyber Risk

by Ron Bradley | April 18, 2022 | Cyber Risk, Data & Cybersecurity

The human element is considered the weakest element in the security “onion.” How do we understand what our users may or may not be doing to create some level of risk to our cyber environments? Organizations need a way to detect anomalies that arise intentionally or unintentionally. I recently ....

Approaching IoT Security Risks

Approaching IoT Security Risks

by Eric Krell | April 18, 2022 | Data & Cybersecurity, Internet of Things (IoT)

In case you haven’t heard, Internet of Things (IoT) adoption is soaring. This mobilization has cybersecurity and third party risk management implications that are often overlooked. By 2030, McKinsey research projects that IoT applications “could enable $5.5 trillion to $12.6 trillion in value ....

Whats Procurements Role in ESG

What's Procurement's Role in ESG?

by Mark Rudio | April 14, 2022 | Corporate Culture, Third Party Risk Management

During the 1990s, Procurement professionals were at the heart of strategic sourcing initiatives, focusing on reducing costs, enhancing quality, expanding services, and founding organizations like the International Association of Outsourcing Professionals and the Sourcing Industry Group. Composed of ....

tax season

Tax Season Scams

by Eric Krell | April 13, 2022 | Banking and Financial Services, Industry Verticals, Third Party Risk Management

As tax season comes to a welcome close (file your returns – or an extension -- by April 18!), a recent spike in phishing attacks camouflaged as official IRS emails reminds us that basic cyber-hygiene, like fundamental third party risk management (TPRM) practices, remain pivotal even when tax-filin ....

1 1

What HIPAA Misses: Healthcare’s Patient Privacy Issue

by Kristen Hicks | April 12, 2022 | Data & Cybersecurity, Health Insurance Portability and Accountability Act (HIPAA), Healthcare, Industry Verticals

Data privacy is a fraught subject in any industry. But in healthcare, the stakes are especially high. Many consumers have made (at least some degree of) peace with trading personal data for the convenience of entertainment offered by their favorite apps. But people aren’t necessarily willing to ma ....

« Previous PageNext Page »