
Solarwinds hack – and what can you do today
I have been contacted many times in the last few days to comment on the latest worldwide supply chain breaches – and evidently, the massive
I have been contacted many times in the last few days to comment on the latest worldwide supply chain breaches – and evidently, the massive
One of the key issues in correctly assessing and managing vendor risk is the ability to analyze the potential risk exposure of the vendor and
During the Coronavirus crisis, Your supply chain is your business continuity weakest spot How can the Coronavirus affect your business continuity? In this article, I’ll
Tech Giant GE Discloses Data Breach After Service Provider Hack The recent data breach of a GE supply chain service provider resulted in the theft
California has always been known as a progressive state forprotecting consumer rights and individual privacy. While this has been a benefit for itsresidents it has
VRM is becoming a more widespread nowadays, and more and more organizations realize the importance of conducting proper vendor verification process to reduce cyber risk.
It’s always nice to see something you are building grows and becomes a core key component in your customer’s experience. This time we’re talking about
The Vendor Risk Management (VRM) space has quickly become a hot topic this year. It seems like everywhere you turn, new companies offering VRM solutions
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.