Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » third-party security

Articles Tagged with ''third-party security''

Security Podcast- Welch.jpg
The Security Podcasts

Listen to Michael Welch and how to address fourth-party risks and improve supply chain security in our latest The Security Podcast episode

December 29, 2021

Listen to the latest The Security Podcasts edition as we sit down with Michael Welch, Managing Director of Strategy and Risk at MorganFranklin Consulting, to discuss the growing challenges of fourth-party risks, why they're important, and how organizations can mitigate their impacts.


Read More
privacy-security-freepik5872.jpg

An unfortunate side effect: How privacy trends are weakening website security

Sam Crowther
Sam Crowther
November 18, 2021

Enterprises and security vendors alike need to better understand how privacy improvements affect the way companies ascertain which traffic is human and which is fake, and thus the impact it has on stopping online fraud.


Read More
cyber-data-protection-freepik456.jpg

New strategic direction for CMMC 2.0 announced

November 8, 2021

The Department of Defense announced the strategic direction of the Cybersecurity Maturity Model Certification (CMMC) program, marking the completion of an internal program assessment led by senior leaders across the Department.


Read More
shadow-code-freepik.jpg

Shadow Code remains a high security risk

September 22, 2021

More than 99% of websites use third-party scripts. Still, only one in three can detect potential problems that could lead to digital skimming and Magecart attacks, according to a new PerimeterX study.


Read More
hacking freepik

What the Kaseya attack can teach local governments about preventing third-party data breaches

Case Study
Joel Burleson-Davis
September 15, 2021

Tony Bryson, Chief Information Security Officer for the Town of Gilbert, Ariz., scaled the town's cybersecurity defenses by adopting a preventative solution through a  third-party security company to help to mitigate the risks associated with supply chain attacks.


Read More
security data

End-to-end encryption and securing data

Matt Perdew
Matt Perdew
August 23, 2021

What steps can a company take to provide sufficient redundant security so a vendor breach doesn't result in financial damage?


Read More
hacked-sign-freepik

GOP allegedly hacked by APT29, known as Cozy Bear

July 8, 2021
APT29, known as Cozy Bear, has allegedly breached the computer systems of the Republican National Committee (RNC), according to reports.
Read More
ransomware-attack freepik

Up to 1500 businesses affected by Kaseya supply chain ransomware attack

July 6, 2021
Kaseya’s VSA product has been the victim of a sophisticated ransomware attack, affecting 60 Kaseya customers and an estimated 1,500 downstream businesses.  Attackers are allegedly demanding $70 million in return for a universal decryptor software key that would unscramble all affected machines.
Read More
supply chain - freepik

Improve supply chain security with intelligence from surface, deep & dark web

Tyler Logtenberg
July 1, 2021
Threat intelligence is only one piece of the puzzle when it comes to improving supply chain security. As part of protecting the supply chain and reducing third-party risk, here's how your organization should get started.
Read More
SBS Edna Conway

Registration is open for webinar on increasing your organization's operational resilience

June 17, 2021
Microsoft’s Edna Conway, Chief Security and Risk Officer of Azure, will lead a webinar, Operational Resilience in a Hyperconnected World, on June 17, 2021 at 2:00 p.m. EDT, and provide a real-world, tangible approach to address security and resilience to support you in your journey to operational resilience. 
Read More
Previous 1 2 3 4 5 6 7 8 9 10 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing