The Top Vendor Management Processes to Automate

Compliance, security and risk are three reasons why vendor management is becoming a vital task Managing vendor access into your network and systems is becoming a more critical job as news about third-party breaches seems to break almost daily and regu… Continue reading The Top Vendor Management Processes to Automate

How to Design a Vendor Management Process

Whether you’re a small business or a global enterprise, over the last decade or so outsourcing business functions to third-party vendors has become essential to your business operations. Vendors are used in nearly every business process. They provide … Continue reading How to Design a Vendor Management Process

The Cybersecurity Industry’s Third-Party Risk Management Problem Is Rooted in Visibility

Only one-third of organizations feel their processes for third-party risk management are effective. The root of the issue lies in visibility and ineffective process.

The post The Cybersecurity Industry’s Third-Party Risk Management Problem Is Rooted in Visibility appeared first on Security Intelligence.

Continue reading The Cybersecurity Industry’s Third-Party Risk Management Problem Is Rooted in Visibility

How to Make Third-Party Risk Management Second Nature

Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more.

The post How to Make Third-Party Risk Management Second Nature appeared first on Security Intelligence.

Continue reading How to Make Third-Party Risk Management Second Nature

Why It’s Time to Cross Out the Checklist Approach to Vendor Security

When it comes to vendor security, all the handshakes and paperwork that go into a business deal tend to get in the way of proper audits and thorough vulnerability assessments.

The post Why It’s Time to Cross Out the Checklist Approach to Vendor Security appeared first on Security Intelligence.

Continue reading Why It’s Time to Cross Out the Checklist Approach to Vendor Security

Playing It Smart for Data Controllers and Processors

Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors.

The post Playing It Smart for Data Controllers and Processors appeared first on Security Intelligence.

Continue reading Playing It Smart for Data Controllers and Processors

The Competing Claims of Security Vendors Sow Customer Distrust

There is no such thing as a magic bullet for security. When security vendors push their products too hard, customers grow skeptical of the entire industry.

The post The Competing Claims of Security Vendors Sow Customer Distrust appeared first on Security Intelligence.

Continue reading The Competing Claims of Security Vendors Sow Customer Distrust

Dealing With Third-Party Vendor Connections in Your Network

While most third-party vendor connections are harmless and well-intentioned, they can act as footholds for attackers to gain access to your network.

The post Dealing With Third-Party Vendor Connections in Your Network appeared first on Security Intelligence.

Continue reading Dealing With Third-Party Vendor Connections in Your Network