Remove 2016 Remove Cyber Risk Remove Digital transformation
article thumbnail

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

The Last Watchdog

So they began inundating their third-party suppliers with “bespoke assessments” – customized cyber risk audits that were time consuming and redundant. Kneip also painted the wider context about why effective third-party cyber risk management is an essential ingredient to baking-in security at a foundational level.

article thumbnail

RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains

The Last Watchdog

CyberGRX launched in 2016 precisely because bespoke assessments had become untenable. Digital transformation had taken hold; so their timing was pitch perfect. Cyber risks profiling. CyberGRX’s global cyber risk Exchange caught on quickly. Here are key takeaways: Smoothing audits.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

What’s happening is that supply chains are becoming more intricate and far-flung the deeper we move into digital transformation and the Internet of Things. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem. Uphill battle.

article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Now toss in the fact that digital transformation is redoubling software development and data handling complexities. This, in short, is the multi-headed hydra enterprises must tame in order to mitigate rising cyber risks. Demisto launched in May 2016. Sutton: Digital transformation is a big driver for SOAR.

article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market. Digital transformation is all about high-velocity innovation and on-the-fly change.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. Founded in 2016, the Rishon LeZion-based vendor specializes in breach and attack simulation and security posture verification.

article thumbnail

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

The Last Watchdog

Other nation state groups learned from watching what worked for the Russians in 2016. LW: How far do you expect the corporate sector to actually get mitigating cyber risks as digital transformation accelerates? Cunningham: We are in the early stages of an inflection point for the future of security.

Passwords 149