The search found 3767 results.
Blog
More and more companies are hiring Chief Information Security Officers (CISOs) to navigate the rough waters of cybersecurity. The need for CISOs in enterprise organizations is at the height of importance with the increase in both ransomware attacks and data breaches.
Blog
Providing remote access for your third-party vendors is an essential part of doing business. Whether it’s Amazon’s AWS, Google’s G-Suite, or a custom platform, most enterprises have migrated their back-office, e-commerce, and other operations to cloud applications and remote services infrastructure.
Blog
If you’re in the cybersecurity world, you’ve probably come across the acronym PAM, or Privileged Access Management. This technology adds additional access controls and processes to coveted privileged credentials in order to prevent them from being compromised, while also limiting the damage if they ever are compromised.
Blog
Risk management is critical for any company looking for growth and profit instead of liabilities and reputational damages. So let's answer an important question: What is third-party remote access, and why should you care? Networks can be attacked from all sides.
Blog
Conversations regarding cyberattacks are often limited to the organization that suffered reputational damage from a data breach. We talk about what led to the cyberattack, how it was found and reported, and the associated costs.
Blog
Whether it’s a sticky note, a phone app, or keeping a password saved on your computer, we don’t always take all the precautions that we should to keep our password a secret from others.
Blog
Role-Based Access Control, or RBAC as it’s commonly referred to, is one of the types of access control that has been considered a core best practice for organizations to protect their IT assets for a long time.
Blog
I have written often about the three main principles of sound Third-Party Risk Management (TPRM); they are identify, control and audit. By using these three basic control areas, risk from third parties to organizations can be greatly reduced.
Blog
It's not a matter of if your company will be hacked - but when. Planning and ongoing preparation is the ultimate protection against cyber-attacks. Our guest blogger and cybersecurity expert, Marco Essomba, explores seven reasons companies get hacked.
Blog
Working with vendors, business partners, and other third parties is a fact of life for most organizations. However, once vendors are selected, vetted, and onboarded, they will often be given remote access to your network, and that’s where problems can arise.