`

Articles

June 24, 2020
TPRM 101- Your guide to creating a Third-Party Risk Management Program

What is a TPRM strategy and what is the ideal workflow for getting started?  Outsourcing or the use of third parties inherently comes with...

Read More
June 22, 2020
STIG vs CIS part 2: Selecting the Best Baseline for Your Business

This blog is part 2 of our multi-post blog series on STIG vs CIS. In this second post, we’re continuing to unpack the differences...

Read More
June 22, 2020
STIG vs CIS part 1: The Anatomy of Baselines and Compliance

STIG vs CIS This blog is part 1 of our multi-post blog series on STIG vs CIS. In this series,...

Read More
June 15, 2020
Incident Response Self-Assessment

Incidents Happen, How Prepared is Your Organization?  The nature of threats and Incident Response (IR) is an ever-changing landscape. In order to stay...

Read More
June 2, 2020
What’s the difference between Pen Testing, Red Teaming, and Threat Hunting?

At first glance, it seems like pen testing, red teaming, and threat hunting all seem like a fancy way of saying the...

Read More
May 7, 2020
A Day in the Life of a TPRM Analyst

What it’s like to be a Third-Party Risk Management (TPRM) Analyst This month we’re interviewing Kelley Grogan, a Third-Party Risk...

Read More
April 23, 2020
Compliance or Engineering: Cybersecurity’s Chicken & the Egg

Compliance-First or Engineering-First Approach? What came first, the chicken or the egg?  This common idiom befuddles many issues amongst philosophical...

Read More
April 21, 2020
Security Baseline and Compliance Automation Webinar

How to Overcome Compliance Barriers with Security Automation Webinar Overview: We’ll be honest with you, compliance is hard. Between shifting...

Read More
April 14, 2020
Keys to A Successful Onsite Vendor Assessment for your TPRM program

How Onsite Assessments fit into your TPRM Strategy TPRM and Third-Party Vendor Assessments Third-Party Risk is a major concern for many organizations, especially...

Read More
March 20, 2020
4 Ways to increase your security ROI with automation

How and why you should use automation to enforce security compliance  Enterprise IT is a vast network of highly varied, distributed...

Read More
March 20, 2020
A Day in the Life of a Cybersecurity Recruiter at MindPoint Group

A Day in the Life of a Cybersecurity Recruiter This month we talked with Mindy Vo, one of our Cybersecurity...

Read More
March 12, 2020
Understand the role fourth-party vendors play in your risk profile

Don’t let attackers in through your fourth-party vendors Your third-party vendors have their own third-party vendors. Those are your fourth-party...

Read More
1 23 4 5 ... Last