When selecting a vendor, consider data privacy and cybersecurity risks right from the start. How much data will the vendor need to access? Can that be limited in any way? Does the vendor require ...
Vendors are key to the success of almost every information technology consultant. Strong vendor relationships help good consultants excel, but a dysfunctional vendor alliance can sink even the most ...
SaaS brings with it a unique set of challenges for those responsible for security. Barmak Meftah, senior vice president at Fortify Software, says the most important shift is looking at your software ...
SANTA FE, N.M.--(BUSINESS WIRE)--The Shared Assessments Program today issued “CCPA Privacy Guidelines & Checklists,” the security and risk industry’s first ...
Managing external partners has become a critical part of doing business today. As companies expand and rely more on outsourcing, the risks tied to outside vendors grow larger. Businesses can face ...
In my last post, I talked about the momentum we’re seeing behind a growing demand for better governance, a culture of ethics & compliance, and greater accountability. And how this wave of change was ...
A project management checklist makes it easy to stay on top of your projects. Learn how to create one in this guide. The start of a new project is a time of excitement and anxiety. You have an entire ...