Risk Management May 26, 2016 Merger Considerations Must Involve Cybersecurity 2 min read - Merger considerations need to be expanded to include cybersecurity and systems concerns, security audits, third-party SLAs and more.
Application Security May 12, 2016 Know Your Vendor Security Practices 2 min read - When you hire a third party for some IT work, do you really know about their vendor security practices? Google certainly does.
August 21, 2015 Why Security Is Becoming a Big Piece of the IT Outsourcing Market 2 min read - A new report from Computer Economics indicated that organizations are devoting larger portions of their budgets to IT outsourcing.
Intelligence & Analytics August 12, 2015 Extending the Reach of Cybersecurity 2 min read - Service providers can help SMBs employ excellent cybersecurity through specialized practice, shaping themselves into hubs of security competencies.
Fraud Protection July 16, 2015 Third-Party Insiders: Compliance as the First Step to Trust 2 min read - Third-party insiders are vital to organizations, but you must apply security management and compliance controls to these workers before building trust.
June 9, 2015 Game Over? Plug-In Flaw Targets Gamer Data 3 min read - A flaw in the Unity Web Player plug-in puts gamer data at risk, but this is just the tip of the iceberg. How do companies defend against plug-in problems?
X-Force May 22, 2015 When Vendor Security Vulnerabilities Become Your Own 3 min read - Vendor security vulnerabilities can quickly become a major problem for your business, and it's up to you to minimize the risks involved.
Application Security May 21, 2015 Does the VENOM Vulnerability Affect You? 4 min read - The VENOM flaw is the latest security vulnerability to come to light. But are you at risk? And how should you react if your data is suceptible to attacks?
Banking & Finance December 5, 2014 Accountability Key to Third-Party Security Management 3 min read - Organizations must hold third-party vendors, partners and service providers accountable for the role they play in ensuring the enterprise's security.