Remove cyber-risk 8-supply-chain-security-requirements
article thumbnail

Free Expert Insights

IT Governance

Here are all our Q&As to date, grouped by broad topic: AI Cyber attacks and data breaches Cyber Essentials Cyber resilience Cyber security Data privacy DORA Incident response ISO 27001 PCI DSS PECR Security testing Training Miscellaneous To get new expert insights straight to your inbox, sign up to our weekly newsletter, the Security Spotlight.

article thumbnail

Best Third-Party Risk Management (TPRM) Tools of 2021

eSecurity Planet

Cyberattacks caused by supply chain vulnerabilities mean organizations need a renewed perspective on how to address third-party security. In a developing market, third-party risk management (TPRM) software and tools could be the answer to helping organizations fill the gap. Best Third-Party Risk Management (TPRM) Tools.

Risk 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 14 Cloud Security Principles explained

IT Governance

Cloud security is an essential part of today’s cyber security landscape. But whenever organisations adopt technological solutions such as this, they must acknowledge the risks that come with it. This might include spotting misconfigured firewalls or physical security threats.

Cloud 126
article thumbnail

Application Security: Complete Definition, Types & Solutions

eSecurity Planet

Application security is the practice of securing software and data from hackers, whether that application comes from a third party or was developed in house, regardless of where it resides or how it’s accessed. How Does Application Security Work? What Are the Types of Application Security?

article thumbnail

NERC Releases Draft Standard for Cybersecurity Supply Chain Risk Management

Hunton Privacy

On January 19, 2017, the North American Electric Reliability Corporation (“NERC”) released a draft Reliability Standard CIP-013-1 – Cyber SecuritySupply Chain Risk Management (the “Proposed Standard”). A formal comment period for the Proposed Standard is now open and will remain open through 8 p.m.

Risk 45
article thumbnail

SEC Chair: Sweeping New Cybersecurity Rules Are Coming Soon

Data Matters

On Monday, January 24, 2022, in a speech at the Northwestern University Pritzker School of Law annual Securities Regulation Institute conference, Gary Gensler, Chair of the U.S. These SEC rules could broadly affect cybersecurity requirements across the U.S. Public Companies and Service Providers.

article thumbnail

How Cyber Essentials can help secure your patch management

IT Governance

In this blog series, we will discuss each of the Cyber Essentials scheme’s five security controls that, according to the UK government, could prevent “around 80% of cyber attacks”. Our third blog covers patch management and addresses the need for organisations to keep software up to date with security patches.