In part 2 of his series on the cybersecurity risks in compliance, Michael Volkov addresses how companies can manage cyber with their third-party vendors. “Over half of all cyber-attacks are the direct or indirect result of third party access,” Volkov writes. “Given this fact of corporate life, companies have to manage these risks by ensuring third-party access to sensitive data is restricted to only that which is needed to provide a specific service. Third-party due diligence for cyber risks has to focus on some weighty issues.”
Cybersecurity, Privacy, & AI
Trending Now
Anthropic’s Reported $30B Funding Talks Spotlight AI’s Growing Role in Cybersecurity, Defense • DC3 Seeks New Contractors for DCISE Voluntary Cyber Information-Sharing Program • Pentagon Cyber Official Calls Advanced AI ‘Revolutionary Warfare’ • NIST Aims for Summer Release of AI Cyber Guidelines • President Trump’s Cyber Strategy: Cross-Sector Implications for U.S. and UK Businesses
Managing Third-Party Vendor Cybersecurity Risks (Part II of III)
Alexander Supertramp | Shutterstock
Stay compliant and protected with daily updates on cybersecurity, data privacy, and federal oversight with our Cyber & Privacy newsletter, delivering up-to-the-minute intelligence Monday–Saturday — Subscribe here.
