MVSP, or Minimum Viable Secure Product, is a baseline created by industry leaders to ensure the security of third-party solutions. Learn more about this risk management strategy here.
Enterprise security leaders who outsource some aspects of their cybersecurity responsibilities have reported faster attack detection and response rates. Here are seven tips when looking for the right cybersecurity partner for an organization.
Cybersecurity executive Neda Pitt has been appointed the new Chief Information Security Officer (CISO) at Globality, a vendor sourcing platform for enterprise organizations.
Security professionals can use these four strategies to better protect themselves against third-party risk, which can lead to cyberattacks and data breaches.
Security professionals engage with multiple issues to best secure their businesses. A risk management provider can help security leaders deal with third-party risk.
In a data breach of California Pizza Kitchen, personal data from over 100,000 employees including names, Social Security numbers and other identifying information was accessed by cybercriminals. Security leaders around the globe give their insights into the cyberattack.
The SolarWinds hack is a strong reminder why third-party risk management is so important. Not only was SolarWinds breached, but the hack is now believed to have affected upward of 250 federal agencies and businesses. Here, we speak to Jonathan Ehret, Vice President of Strategy & Risk at RiskRecon, who believes organizations should be asking their vendors about the third-party risk management and cybersecurity policies they have in place to protect against a breach and leak of critical data.