Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Do You Perform a Supplier Risk Assessment?

When choosing a supplier to partner with, organizations need to perform their due diligence and assess the cyber risks associated with each particular supplier using risk assessment evaluations. Part of the supplier lifecycle management process includes ensuring that these third parties are meeting minimum security requirements, maintaining strong cybersecurity programs, and adhering to all relevant compliance regulations.

Random but Memorable - Episode 10.7: The Developer Special

Join us for the developer special! 👩‍💻🧑‍💻 Roo sits down with a panel of special guests to discuss how we're working and engaging with the dev community, the incredible suite of 1Password developer tools available, and a sneak peak at all the exciting things we have planned for the future.

Quality of Experience vs Quality of Service: Which are You Getting?

Quality of Service (QoS) is a standard metric for any infrastructure, networking, or operations team contracting with a tech vendor The average network SLA, for example, is crawling with QoS metrics covering a range of things, including packet loss, jitter, latency, bandwidth allocation, response time, and uptime.

Users From Two Dating Sites Get Exposed in Latest Breach

A few very personal and private specialized dating sites were recently hit by data attacks that have led to users being exposed and potentially released onto the internet. Sites CityJerks and TruckerSuckers both experienced data breaches from the same individual who is attempting to sell the stolen data. The information taken from these accounts is highly private and personal, and anyone involved in this breach is likely to be unhappy about having their data exposed.

Women in Cybersecurity UNITE

The gender gap in STEM fields is a huge problem. Women only make up 25.2% of the computer and mathematical occupations in STEM, even though these jobs are among the fastest growing and highest paid in the world. Why is this happening? What can we do to bridge the gap and get more women these lucrative careers? Those are questions we’re doing our part to solve at One Identity UNITE.

A Closer Look at SecurityScorecard Marketplace

On average, organizations deploy 47 different cybersecurity solutions and technologies. This puts security, IT, and VRM teams in a difficult position, working with various tools that don’t integrate. One-third of organizations identify “non-integration of security tools” as a major roadblock to getting the total value of their investments.

The 5 Biggest Cybersecurity Risks for Businesses Using VoIP

Switching your telephone network to Voice over Internet Protocol (VoIP) has noticeable advantages. Users can experience stronger connectivity, significant cost reductions, and a centralized system. But what users also experience are new cybersecurity risks. The question becomes, then, are VoIP savings worth the costs to security?

RegTech for KYC & AML : What are the use cases to improve AML Compliance

The detrimental effects that financial crime may have on businesses and their consumers are nothing new to the fintech sector. When it comes to money laundering, this is especially accurate. Fintechs are attractive targets for money launderers since they only offer digital services, which they believe gives them more anonymity and makes it possible for them to perpetrate crimes undetected.