Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » third-party security

Articles Tagged with ''third-party security''

phishing-fp1170x658v90.png

The top identity-based attacks and how to stop them: Part 2

Part two of this two-part article series examines phishing and third-party account attacks, techniques and tools for mitigation, and tried and true best practices for reducing overall identity-based attack risk.
Slack Profile Photo.jpg
Gurinder Bhatti
August 11, 2022

Let's explore two top identity-based attacks — phishing and third-party accounts — and ways organizations can implement cybersecurity best practices to defend against these.


Read More
identity-security

The top identity-based attacks and how to stop them: Part 1

Part one of this two-part article series examines password spray, credential stuffing, and man-in-the-middle attacks and techniques and tools for mitigation
Slack Profile Photo.jpg
Gurinder Bhatti
August 8, 2022

What are the most prominent identity-based attacks and how are they carried out? And how can security teams leverage identity technologies to mitigate those attacks and reduce their organizational risk?


Read More
road signs
Global News

Third-party risk management programs at a crossroads

Maria Henriquez
July 15, 2022

Organizations are starting to adapt their third-party risk management (TPRM) programs to address new and emerging risks outside of the information technology (IT) realm, a Prevalent study found. 


Read More
lessons-ideas-freepik1170x658.jpg

3 security lessons we haven’t learned from the Kaseya breach

Dan-Schiappa.png
Dan Schiappa
July 1, 2022

The massive Kaseya security breach that impacted thousands forced the industry to re-evaluate their software supply chain security practices. Here we break down the cybersecurity lessons that still need to be learned. 


Read More
aerial-view-container-cargo-ship-sea (2).jpg

How secure is your digital supply chain?

JonathanDambrot.jpg
Jonathan Dambrot
June 24, 2022

Here are five ways cybersecurity leaders can secure the digital supply chains in which they operate.


Read More
supply-chain-1170x658freepik.jpg

Clear and present danger: SaaS supply chain attacks

Yoni Shohet
June 14, 2022

The Okta, GitHub and MailChimp supply chain breaches illustrate the inherent risks of leaving your supply chain in the dark. What can be done to mitigate these risks?


Read More
risk-assessment-freepik1170x658v58.jpg

Do software vendors care as much about security as you do?

matias-madou.jpg
Matias Madou
June 10, 2022

Any comprehensive approach to cybersecurity must include a detailed third-party risk assessment, covering an assessment of how partners view governance, risk, and compliance within their own organizations.
 


Read More
supply-chain-sec-freepik1170x658v6.jpg

Don’t break the chain: How to secure the supply chain from cyberattacks

Roman Arutyunov
June 10, 2022

Given the increase of attacks on critical infrastructure and third-party suppliers and supply chain partners, let's address security concerns for supply chains and quick solutions.  


Read More
domain-name-freepik1170x658v.jpg

4 emerging threats in the domain name landscape

Elliott Headshot JPEG.jpg
Elliott Champion
May 31, 2022

There are four notable emerging cybersecurity threats in the domain name space organizations need to be aware of for improved brand protection. 


Read More
data-breach-90-freepik1170x658.jpg

Chicago Public Schools suffers massive data breach affecting student, staff data

Maria Henriquez
May 26, 2022

Chicago Public Schools has suffered a data breach that compromised the personal information of 500,000 students and more than 56,000 employees. 


Read More
Previous 1 2 3 4 5 6 7 8 9 10 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing