article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

The culprit: lax practices of a third-party data and analytics contractor. Members gain access to third-party IT security risk management best practices via case studies, surveys, whitepapers, webinars, meetings and conferences. Related: Atrium Health breach highlights third-party risks. Advancing best practices.

Risk 147
article thumbnail

Archive-It Partner News, November 2017

Archive-It

Results and observations from the three previous surveys ( 2011 , 2013 , 2016 ) are available. Make the most of Archive-It’s Google Analytics integration. Archive-It’s Google Analytics integration provides you with regular statistics on the volume and behavior of visitors to your collections on archive-it.org.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Network Security Tools 2021

eSecurity Planet

XM Cyber launched in 2016 and is a winner for its innovation in the breach and attack simulation arena. The Tel Aviv-based vendor focuses on cyber risk analytics and cloud security software to give network administrators more robust visibility into threats. Web application firewall WAF Akamai Imperva. XM Cyber Platform.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Founded in 2016, the Rishon LeZion-based vendor specializes in breach and attack simulation and security posture verification. XM Cyber is a Tel Aviv-based cyber risk analytics and cloud security vendor launched in 2016. See our in-depth analysis of CyCognito’s BAS platform. See our in-depth analysis of SafeBreach.

Risk 67