How do you know your MSSP, managed security service provider, can be trusted and is offering higher value security services that extend beyond simple monitoring and analysis?
What are the privacy policies of CDN and infrastructure providers? Are these providers merely providing passive conduits to host vendors’ content or offering more services like user tracking, profiling, and identity matching?
Third party data breach struck Quest Diagnostics’ billing vendor which exposed patients’ sensitive information including social security numbers and medical information.
7 notified Sears, Best Buy, Delta, and other clients using their platform, about a data breach six months after the breach occurred. What should service providers and organizations that contract these third parties be doing better to protect their customers' privacy and personal data?
Attempted ransomware attack on NYPD fingerprint database was the result of a “bumbling” third-party contractor who was installing video equipment at one of the department’s training academies.
CaCPA, going into effect January 2020, has triggered many organizations to look for reliable data partners to protect consumer privacy. What are the criteria when searching for these colocation partners?
GE suffered a third-party data breach where sensitive employee information was exposed through their contractor, Canon BPS, who handles the company's human resource tasks.
Executives concerned about secure applications but developers are not confident that they are writing secure code or the security of third party modules.
It appears that Chinese hackers have been running Cloud Hopper attacks targeting tech providers for access to their customers' corporate intellectual property and government secrets.
It’s a reality that companies are outsourcing almost every aspect of their operations thus effective vendor risk management is becoming more crucial, how should you do it?