Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » third-party risk

Articles Tagged with ''third-party risk''

Gavel and book

Cyber Risks Can Be Legal Risks: How to Protect the Organization

Jordyn Alger, Managing Editor, Security
Jordyn Alger
October 6, 2025

Attorneys share their insights about the legal considerations organizations should be aware of when it comes to AI, third party relationships and BYOD policies.


Read More
Red keyboard

More than 40% of Fintech Breaches Linked to Third-Party Vendors

Security Staff
May 28, 2025

More than 40% of breaches in fintech organizations can be linked to third-party vendors. 


Read More
Red envelope on yellow background

JPMorgan Chase & Co. CISO writes open letter to third-party suppliers

Jordyn Alger, Managing Editor, Security
Jordyn Alger
May 2, 2025

Patrick Opet, CISO at JPMorgan Chase & Co., writes open letter to third-party suppliers. 



Read More
Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Jordyn Alger, Managing Editor, Security
Jordyn Alger
April 25, 2025

Verizon Business has released its 2025 Data Breach Investigations Report. 


Read More
Laptop with money

Nearly 22,000 impacted by Western Alliance Bank breach

Jordyn Alger, Managing Editor, Security
Jordyn Alger
March 21, 2025

Security leaders discuss the Western Alliance Bank breach, which impacted nearly 22,000 customers. 


Read More
cyber-physical systems (CPS)
Global News

Healthcare organizations report ransomware payments over $500,000

Taelor Sutherland, Associate Editor
Taelor Sutherland
December 11, 2024

Healthcare faced extensive cyberattack costs.


Read More
SEC 500 Panel header

Panelists will discuss third-party risks at SECURITY 500 Conference

Security Staff
November 6, 2024

At an upcoming 2024 SECURITY 500 Conference panel, security leaders will discuss the risks associated with third-party relationships and offer strategies for managing them.


Read More
Utility lines in sunset

Software and IT vendors linked to 67% of energy sector breaches

Jordyn Alger, Managing Editor, Security
Jordyn Alger
October 30, 2024

Two-thirds (67%) of third-party energy sector breaches were caused by software and IT vendors. 


Read More
Laptop with dark screen and green symbols

Third-party attack vectors are responsible for 29% of breaches

Security Staff
February 28, 2024

A recent report reveals that third-party attack vectors are involved in at least 29% of breaches, emphasizing the importance of third-party risk management. 


Read More
LED panel

New research finds gaps in secure access to OT environments

Security Staff
February 26, 2024

Though historically isolated, OT systems are now experiencing increased connectivity that introduces new risks. 


Read More
Previous 1 2 3 4 5 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing