Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|
This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.
|
|
Late last month, SentinelOne, the autonomous endpoint protection company, and Automox, a cloud-based automated patch management and configuration management solution,...
|
|
Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.
|
|
Streamlining functionality and workflows of human capital management (HCM) systems while ensuring a rigorous level of security can be challenging. ADP prides itself on...
|
|
Proofpoint’s Threat Response has claimed the Cybersecurity Excellent Awards Gold Winner for 2019 in the Incident Response category.
|
|
As of April 2019, Malwarebytes’ endpoint detection and response technology will be available to most global managed service providers (MSPs).
|
|
A new report published by the Ponemon Institute confirms that organizations are spending an increasing amount on third-party risk management, but are failing to realize...
|
|