Third Party Risk Management

Business Restrictions vs Safety Protocols, Medical Data: The Hackers' Must-Have, The Greatest Heist, Pinching Fingerprints, Insecure Vertebrae, and Unwanted Passengers. It's CISO Intelligence for Monday 24th February 2025.

Business Restrictions vs Safety Protocols, Medical Data: The Hackers' Must-Have, The Greatest Heist, Pinching Fingerprints, Insecure Vertebrae, and Unwanted Passengers. It's CISO Intelligence for Monday 24th February 2025.

How much security is too much, healthcare: the prime target for data theft, the highest of heists and its fallout, the downside of user ID information, when the digital backbone isn't quit fully connected, and the risks of third-party software carrying a little fungus.
Read More
The Art of Persuasion, Trojans in Recruiter Clothing, More than Pesky Pests, Etsy: The Latest Scammer Target, Cyber Pirates Going Global, and Unwanted Exposure. It's CISO Intelligence for Friday 14th February 2025.

The Art of Persuasion, Trojans in Recruiter Clothing, More than Pesky Pests, Etsy: The Latest Scammer Target, Cyber Pirates Going Global, and Unwanted Exposure. It's CISO Intelligence for Friday 14th February 2025.

Today's food for thought: sweet-talking the bosses, beware of malware bearing job offers, bugs that need a whole lot more than spray, Etsy is the new hunting ground for support scammers, cyber assaults without frontiers, and stocks with the wrong kind of shares.
Read More
Multi-Purpose Malware, Reinforcing Government Sector Cybersecurity, Dangerous Carcasses, Understanding Network Architecture, the Programmes Steering the Ship, and Keeping Eyes on the TPRM Cycle. It's CISO Intelligence for Tuesday 14th January 2025!

Multi-Purpose Malware, Reinforcing Government Sector Cybersecurity, Dangerous Carcasses, Understanding Network Architecture, the Programmes Steering the Ship, and Keeping Eyes on the TPRM Cycle. It's CISO Intelligence for Tuesday 14th January 2025!

Today’s topics: FireScam - the slick new malware on the block, public sector institutions fighting increasing cyber threats, sniffing out a finance scam, how understanding your network infrastructure is an imperative, innocuous is not the same as risk-free, and lifecycles don't only apply in nature.
Read More
An Ominous Shakeup, Ticking Boxes or Fully Covering Compliance Requirements,  ASM Vigilance, the Third-Party Minefield, and Phishing with Dragons. It's the Monday 6th January 2025 Edition of CISO Intelligence!

An Ominous Shakeup, Ticking Boxes or Fully Covering Compliance Requirements, ASM Vigilance, the Third-Party Minefield, and Phishing with Dragons. It's the Monday 6th January 2025 Edition of CISO Intelligence!

Today's topics: it's not the earth that's moving, doing what's necessary vs fully understanding and completing the mission, when safeguarding means checking ALL the loopholes, external vendors needing more than a pat down, and doing the hacker two-step. Your Monday warm-up!
Read More
To Source or Not to Outsource Support, Wiper: The Totally Clean Sweep, Mitigating Remote Working Risks, Tech Skills Outstripping Education, and Defense Needing Defense. It's the Friday 3rd January 2025 Edition of CISO Intelligence!

To Source or Not to Outsource Support, Wiper: The Totally Clean Sweep, Mitigating Remote Working Risks, Tech Skills Outstripping Education, and Defense Needing Defense. It's the Friday 3rd January 2025 Edition of CISO Intelligence!

Today's hot topics: the vulnerabilities of outsourcing IT support, malware that provides a perfectly clean slate, the security protocols associated with remote working, old education tech being overtaken by up-to-date skills, and Acronis needing its own protection. Keeping you informed!
Read More