SecurityScorecard Launches Project Escher to Aid Non-Profits With Vendor Risk Management

SecurityScorecard, a leader in vendor cyber risk rating, has announced an initiative to help non-profit organizations with third-party risk management. Named Project...

BitSight Announces New Cyber Risk Score Benchmarking Service

BitSight, one of the leaders in cyber risk rating, has announced a new product to allow organizations to benchmark against their peers. Dubbed “Peer Analytics,” this...

RiskRecon and RSA Announce Partnership to Bring Cyber Risk Ratings to Archer GRC Customers

​RiskRecon and RSA have announced a partnership to bring RiskRecon’s third-party risk rating services to RSA’s Archer Governance, Risk and Compliance (GRC) system. This...

OneTrust Launches Vendorpedia, a Combined Security and Privacy Third-Party Risk Exchange

At the 2019 RSA Conference, OneTrust announced Vendorpedia, billed as the only security and privacy third-party risk exchange. However, it will need to increase its...

SecurityScorecard Admits That Third Party Risk Management Is Hard and Announces Professional Advisory Services

SecurityScorecard has announced the availability of new professional advisory services to help customers consume its vendor cyber risk rating product. In doing so, it is...

No Surprise: New Survey Confirms That Most Organizations Are Ineffective at Third-Party Risk Management

A new report published by the Ponemon Institute confirms that organizations are spending an increasing amount on third-party risk management, but are failing to realize...

Demisto Acquired by Palo Alto Networks for $560M

Security orchestration, automation, and response (SOAR) firm, Demisto, was acquired by Palo Alto Networks in March as Palo Alto aims to strengthen its commitment to...

Proofpoint SOARs Above the Rest With Award-Winning Security Orchestration, Automation, and Response

Proofpoint’s Threat Response has claimed the Cybersecurity Excellent Awards Gold Winner for 2019 in the Incident Response category.

Security Incident Management Runbook: Third-Party Incident

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Data Breach

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us