It is essential for organizations to identify potential vulnerabilities created by relationships with third-parties. Despite having a mature cyber posture, your organization is still susceptible to breaches if your suppliers/vendors have weak security systems in place. Secure Halo shared insights on the importance of finding third-party gaps, and modifying service level agreements (SLAs) in an article for Dark Reading.
Addressing Third-Party Security Risks
IT Business Edge published an article on "Addressing Third-Party Security Risks," in which Will Durkee, Director of...