Security News
Ted Augustinos of Locke Lord LLP Addresses the ChallengesDefining the scope of third-party risk is challenging, says Ted Augustinos of Locke Lord LLP, who discusses compliance with the New York...
Ryan Davis of Veracode Describes Common Mistakes, Outlines Effective StrategiesSecurity practitioners often overlook the risks of third-party resources, says Ryan Davis of Veracode, who outlines...
Chris Hallenbeck of Tanium Discusses Good Security HygieneSignificant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene...
Mark Sangster of eSentire Shares Lessons LearnedThird-party vendor risk continues to pose a security challenge to organizations. Despite many having formal policies for managing third-party risk,...
Among organizations that engage third parties to provide business services, 83% identified third-party risks after conducting due diligence and before recertification, according to Gartner....
BitSight, the Standard in Security Ratings, announced BitSight Enterprise Analytics, the latest Security Performance Management solution available on the BitSight platform. BitSight Enterprise...
Spreadsheets are dumb. Okay, it’s not that spreadsheets are dumb, or that the people who use them are dumb. That’s not at all what I’m saying. What’s dumb is using spreadsheets to manage...
Learn about trends in information security risk assessment that align with business risk...This webinar explores communication challenges around information security, the typical journey...
Read about approaches your company can take to manage IoT and big data cyber risks.