Third-Party Risk Management

Articles, news, and research on third-party risk management.

Third-Party Risk Management

Attack Surface Management
Cybersecurity
Third-Party Risk Management

What are Security Ratings? Cybersecurity Risk Scoring Explained

This is a complete guide to security ratings and common use cases. Learn why security and risk management teams have adopted security ratings in this post.
Read more
Third-Party Risk Management

Five Things You Need to Know About Third-Party Risk in 2024

Third and fourth party breaches account for over half of all data exposure. Here's what you need to know about third party cyber risk to protect you.
Read more
Third-Party Risk Management

Vendor Risk Assessment Questionnaire Template (PDF Download)

Use this vendor risk assessment questionnaire template to discover potential cyber risks across your third-party vendor relationships.
Read more
Third-Party Risk Management

What is a Third-Party Vendor?

A third-party vendor is any entity that your organization does business with. This can include suppliers, manufacturers, service providers, and more.
Read more
Third-Party Risk Management
Data Breaches
Cybersecurity

The Amex Partner Data Breach and Downstream Liability

Learn more about the recent American Express data breach notification and what it means for cardholders worldwide.
Read more
Third-Party Risk Management

How to Manage Third-Party Risk in a World of Breaches

A comprehensive overview for managing third-party risk. Learn about common causes of third-party risks and how to mitigate them in this post.
Read more
Third-Party Risk Management

What is the Vendor Security Alliance Questionnaire (VSAQ)?

This is a complete overview of the Vendor Security Alliance (VSA) Questionnaire. Learn about how to use the VSA Questionnaire in this in-depth post.
Read more
Third-Party Risk Management

How to Select a Third-Party Risk Management Framework

Learn what a third-party risk management framework is and how to select the right one for your organization in this in-depth post.
Read more
Cybersecurity
Attack Surface Management
Third-Party Risk Management

What is Continuous Security Monitoring?

This is a complete overview of continuous security monitoring. Learn how to reduce cybersecurity risk with continuous security monitoring in this post.
Read more
Third-Party Risk Management

Third-Party Risk Assessment Best Practices in 2024

This is a complete overview of the best practices for third-party risk assessment. Learn how to reduce your third-party risk exposure effectively.
Read more
Cybersecurity
Attack Surface Management
Third-Party Risk Management
Data Breaches

What is Data Security?

Data security is the process of protecting sensitive data from unauthorized access and corruption throughout its lifecycle.
Read more
Third-Party Risk Management
Data Breaches

9 Ways to Prevent Third-Party Data Breaches in 2024

This is a complete guide to preventing third-party data breaches. Learn about how organizations like yours are keeping themselves and their customers safe.
Read more
Cybersecurity
Attack Surface Management
Third-Party Risk Management

Why are Security Ratings Important?

This is a complete overview of why security ratings are important. Learn about how to security ratings can help your organization with this in-depth post.
Read more
Data Breaches
Third-Party Risk Management
Cybersecurity

Spotify Resets User Passwords to Protect Against Third Party Data Breaches

The LinkedIn data breach compromised hundreds of thousands of passwords, leaving accounts wide open across numerous sites. Spotify took action.
Read more
Third-Party Risk Management

Why is Third-Party Risk Management Important?

This is a complete overview that outlines why third-party risk management is important. Learn about successful TPRM programs in this in-depth post.
Read more
Compliance and Regulations
Data Breaches
Third-Party Risk Management
Attack Surface Management

What is Protected Health Information (PHI)?

Protected health information (PHI) is any information about health status, provision of health care or payment for health care that is created or collected
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Ready to see
UpGuard in action?