Third-Party Risk Management: How to get your vendors on board

So you’ve finally stood up a proper third-party risk management (TPRM) program. You’ve got your vendors inventoried, their risks assessed and technologies selected to keep them on the straight and narrow. That was the easy part, believe it or not. Now,… Continue reading Third-Party Risk Management: How to get your vendors on board

Third-Party Risk Management: How to Get Your Vendors on Board

So you’ve finally stood up a proper third-party risk management (TPRM) program. You’ve got your vendors inventoried, their risks assessed and technologies selected to keep them on the straight and narrow. That was the easy part, believe it or no… Continue reading Third-Party Risk Management: How to Get Your Vendors on Board

Ransomware’s Brutal ‘Second Wave’

Winter is coming and ransomware is well underway with a brutal second wave. And while some may call this just a natural evolution, there is no doubt that attacks are picking up steam and shifting to a far more aggressive and brutal mode. With the conf… Continue reading Ransomware’s Brutal ‘Second Wave’

How the Cloud Could Improve Vendor Access Management

At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you are trying to provide access for third parties to internal systems, and whether it’s a VPN concentrator or a vendor privilege… Continue reading How the Cloud Could Improve Vendor Access Management

Reasons to consider a cloud deployment of your vendor access management system

To cloud or not to cloud? That seems to be the question for every IT system these days and vendor management is no exception. The benefits of cloud which include cost savings, expensing IT versus capital expenditures and the scalability of cloud often … Continue reading Reasons to consider a cloud deployment of your vendor access management system