Third-Party Risk Management

Articles, news, and research on third-party risk management.

Third-Party Risk Management

Third-Party Risk Management

The History of Vendor Risk Scoring

Vendor risk scoring assigns vendors a single risk score– typically a number or letter grade– to facilitate comparison between vendors and portfolios.
Read more
Cybersecurity
Attack Surface Management
Third-Party Risk Management
Data Breaches

What is Defense in Depth?

Defense in depth is a cyber security strategy that uses a series of layered, redundant defensive measures to protect sensitive data, PII and other assets.
Read more
Third-Party Risk Management

Planning Your Vendor Security Assessment Questionnaire

Learn the 6 key steps to create effective vendor security assessment questionnaires in 2019, so you can better manage your vendor risk exposure.
Read more
Third-Party Risk Management

What Is Third-Party Risk Management (TPRM)? 2024 Guide

This is a complete guide to third-party risk management in 2023. Learn how to reduce third-party and fourth-party risk with this in-depth post.
Read more
Third-Party Risk Management

What is the Consensus Assessments Initiative Questionnaire (CAIQ)?

This is a complete overview of the Consensus Assessments Initiative Questionnaire (CAIQ). Learn how to use the CAIQ in this in-depth post.
Read more
Third-Party Risk Management
Attack Surface Management
Cybersecurity

BitSight Alternative for Managing Cyber Risk in 2024

Looking for a BitSight alternative? We look at the key differences between BitSight and UpGuard.
Read more
Third-Party Risk Management

What is Vendor Due Diligence? Choosing Secure Vendors in 2024

Your vendors need to follow stringent cybersecurity practices to protect you from cyberattacks. Learn the correct vendor due diligence process.
Read more
Attack Surface Management
Data Breaches
Cybersecurity
Third-Party Risk Management

Honeytokens as a Defense Against Supply Chain Attacks

Supply chain attacks are on the rise but their attempts could be detected with Honeytokens. Learn how to implement them into your cybersecurity.
Read more
Attack Surface Management
Data Breaches
Third-Party Risk Management

11 Ways to Prevent Supply Chain Attacks in 2024 (Highly Effective)

Supply chain attacks are on the rise. Follow these prevention tips to avoid falling victim to these devastating breaches.
Read more
Third-Party Risk Management

Overview: Custom Questionnaire Builder by UpGuard

Learn about UpGuard's new custom questionnaire builder for vendor risk assessments.
Read more
Third-Party Risk Management

What is Supply Chain Risk Management (SCRM)?

Learn why supply chain risk management is important and how to expertly manage supply chain security risks
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Ready to see
UpGuard in action?