News

Drug and device manufacturers are increasingly targeted by cyber threats that can compromise patient safety, intellectual property, and other ...
Cohesity’s data security and management technology, coupled with the benefits of DSPM, will deliver instant discovery of all data workloads, both sanctioned and unsanctioned, while also ...
As part of CRN’s Security 100 2025, we’ve assembled the following list by collecting many of the top vendors in the related — but not identical — segments of identity and access security ...
GuidePoint Security announced today that Bugcrowd has joined its Emerging Cyber Vendor Program. With this partnership, Bugcrowd will be able to leverage GuidePoint’s extensive federal expertise ...
Cyber Essentials version 3.1 sets out new security clarifications, guidance Cyber Essentials version 3.1 includes changes and clarifications, alongside some important new guidance.
By speaking with customers, you gain unbiased insights into the vendor’s security strengths and weaknesses, as well as the customer’s overall satisfaction with the provider. 3.
While many companies are implementing strong security controls within their organizations, they may not necessarily be aware of the vulnerabilities resulting in breaches and cyber-attacks emanating ...
Third-party risk management platforms: Platforms like BitSight and Security Scorecard allow organizations to monitor the external security posture of their vendors continuously.
If that is the case, see if you can set the relationship with your vendor back on track. But if you determine that the fault is with the vendor, it is a different ballgame. One option is to simply ...
Once the operational aspects of the relationship have been assessed for inherent risk, and the vendor's security posture has been evaluated and deemed sufficient, it is time to work with your ...