Today, building a successful vendor risk management (VRM) strategy goes far beyond sending out spreadsheets or finding a SaaS tool to assess your vendors. According to the law, this step will check the due diligence box, but if you really want to keep your...
NIST and other vulnerability detection groups have the job of immediately alerting enterprises to new cyber threats. Then, VRM teams have the job of immediately responding. This represents a major shift. Not long ago, information security measures such as system...
Cloud computing and coronavirus are among the most consequential forces impacting cybersecurity today. Together, they have created an “endpoint explosion.” Yesterday’s periodic measures are important; however, the only way to manage today’s cyber risks is with a...