3 Golden Rules of Modern Third-Party Risk Management
July 13 2022It's time to expand the approach of TPRM solutions so risk management is more effective in the digital world.
Read moreIt's time to expand the approach of TPRM solutions so risk management is more effective in the digital world.
Read moreLast time they arrived 28 minutes after lighting up their fake domain... this time it was just 21 minutes
Read moreCynet CISO survey reveals lack of staff, skills, and resources driving smaller teams to outsource security with advanced tools, technologies, and services.
Read moreThe massive phishing campaign does not exploit a vulnerability in MFA. Instead, it spoofs an Office 365 authentication page to steal credentials.
Read moreQuSecure’s QuProtect leverages unique post-quantum cryptographic algorithm on government legacy systems to achieve world’s first and only post-quantum resilient channel within a government facility.
Read moreBarracuda research finds organizations are struggling to protect operational technology and getting breached as a result.
Read moreMachine learning and automation can help free up security pros for higher-value tasks.
Read moreUpgrades to the Exostar platform promote secure, compliant collaboration and handling of controlled unclassified information.
Read moreBusinesses receive an invoice via email with a credit card charge and are asked to call a fake number and hand over personal information to receive a refund.
Read moreThis is an excellent essay outlining the post-Roe privacy threat model. (Summary: period tracking apps are largely a red herring.)
Taken together, this means the primary digital threat for...
Read more
Recent Comments