article thumbnail

Best Third-Party Risk Management (TPRM) Tools of 2021

eSecurity Planet

In a developing market, third-party risk management (TPRM) software and tools could be the answer to helping organizations fill the gap. This article looks at the top third-party risk management vendors and tools and offers a look into TPRM solutions and what buyers should consider before purchasing. Aravo TPRM.

Risk 129
article thumbnail

Acquisition Related Data Breach Hits DNA Testing Lab

SecureWorld News

M&A cyber risk is real. DDC) detected potential unauthorized access to its network, during which there was unauthorized access and acquisition of an archived database that contained personal information collected between 2004 and 2012. Have you looked closely enough at this type of risk? What's happened in the past?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

It’s a roller coaster of a time to lead, as CIOs, CISOs and CTOs are having to deal with more users, data, devices, technologies, connectivity, mobility, regulations, risks, and threats than they care to. Cyber risks top worldwide business concerns in 2022. The digital skills gap comes at a cost. Women can enable this.

CISO 130
article thumbnail

CynergisTek Signs Six-Figure Extension Contract with Nationally Ranked Hospital

CyberSecurity Insiders

As healthcare continues to be a target of cyber-related incidents, hospitals need to take necessary steps to not only identify cyber risks, but follow through with prioritized remediation efforts to protect patient data, and avoid obstructing patient care.

article thumbnail

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

. » Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy. grid happened in March of this year. Joe Weiss, Applied Control Solutions.

article thumbnail

Last Watchdog’s IoT and ‘zero trust’ coverage win MVP awards from Information Management Today

The Last Watchdog

I’ve been paying close attention to privacy and cybersecurity since 2004, first as a technology reporter at USA TODAY, then as Editor-In-Chief of ThirdCertainty.com, a corporate-underwritten news analysis blog. I’ve never done stories to win awards. That usually happens every time I publish a story under my byline.

IoT 33
article thumbnail

Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk

The Security Ledger

And this year is a special occasion: a Quinceañera of sorts recognizing 15 years since the first Cybersecurity Awareness Month in 2004. As my guests this week note: the goals of Cyber Security focus and importance of cyber security awareness month has changed a lot since the early 2000s. October is Cybersecurity Awareness Month.