Comprehensive software reviews to make better IT decisions
CORL Technologies Launches Its Vendor Risk Management Resource Center
avigating the vendor risk management space, particularly in the current environment that consists of a mix of cloud, managed services, and critical supply chain, is key to ensuring that you don’t inadvertently introduce new risks through this dynamic channel.
As a result CORL Technologies, which specialize in tech-enabled managed services for vendor risk management, is launching a resource center focused on vendor risk management that will include blogs, educational webinars, and podcasts. The resource center will be updated weekly and will be available on demand.
Cliff Baker, CEO of CORL Technologies, said, “We see a paradigm shift currently underway for the migration of critical business functions to third-party and cloud-based platforms. The ability to get visibility into third-party data supply chains and their respective security and compliance postures will soon become the paramount mandate for information security and risk programs.”
In the same announcement, Baker states that “effective security and compliance programs of the next decade must quickly adjust their orientation towards the oversight and protection of downstream vendors and systems responsible for critical business functions.”
The shortage of personal protective equipment required during the COVID-19 pandemic is a top-of-mind recent example of critical supply chain risk. Beyond mere capacity issues, other serious downstream risks such as natural disasters, shipping disruptions, and industrial fires can critically impact your supply chain. Couple these incumbent risks with vendor compliance and security program maturity of vendors and their related third parties, and the perspective on corporate risk management sees a vast shift. Identifying, measuring, and remediating the gamut of potential vendor or third-party risks requires new metrics, methods, tools, and oversight.Out of sight should not mean out of mind, at least not for the enterprise risk leader.
Want to Know More?
By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers were able to unknowingly download the modified code for twenty-four hours.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
From employee management through leadership and communication, increased cyber threats, logistics and operations to post-pandemic planning and risk mitigation, the threat landscape has experienced enormous change. These noticeable shifts force us to consider rethinking and retooling how we address risk.
In an interview with Allison Furneaux, VP Marketing at CyberSaint Inc., developers of CyberStrong Integrated Risk Management platform in June 2020, Allison indicated that its focus has been on cybersecurity from the beginning.