Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide

August 26, 2020

Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide
The healthcare industry remains a prime target for cyberattacks, with the growing adoption of digital health technologies escalating the risk. Hospitals and clinics, custodians of vast amounts of sensitive patient data, are particularly vulnerable. As the industry navigates the digital landscape, ensuring cybersecurity compliance is paramount to protecting patient… Read More
Healthcare
Services
Tech Center
What is a Third-Party Vendor? Tips for Managing Vendor Risk

July 23, 2020

What is a Third-Party Vendor? Tips for Managing Vendor Risk
A third-party vendor is a company or entity with a direct written contract to provide products or services to your customers on your organization’s behalf. In today’s digital landscape, organizations are heavily reliant on third-party vendors who help carry out day-to-day operations more efficiently. These vendors… Read More
Attack Surface Management
Tech Center
8 Effective Vendor Due Diligence Best Practices

July 13, 2020

8 Effective Vendor Due Diligence Best Practices
Across industries, vendors are becoming essential assets to many organization’s day-to-day operations. However, it’s important to note that when an organization decides to work with or acquire a vendor, they are agreeing to take on any potential threats or drawbacks posed by the company, as well as its digital operations. Read More
Tech Center
The CISO’s Guide to Reporting Cybersecurity to the Board

April 6, 2020

The CISO’s Guide to Reporting Cybersecurity to the Board
Organizations have multiple stakeholders, all of whom have varying levels of cybersecurity knowledge and interest. As a CISO, you need to be able to demonstrate the effectiveness of the cybersecurity solutions you employ with regard to each stakeholders’ area of expertise. Using key performance indicators (KPIs) provides visibility into your… Read More
Tech Center
What is Cyber Threat Intelligence? A Complete Guide

March 12, 2020

What is Cyber Threat Intelligence? A Complete Guide
With cyber threats becoming increasingly difficult to track and manage, IT professionals must take a proactive approach to security in order to protect their assets from a breach. This requires ongoing visibility into the threat landscape and the methods cyber adversaries are employing to carry out attacks. One way this… Read More
Cyber Threat Intelligence
Tech Center
4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program

January 6, 2020

4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program
Managing your Third Party Cyber Risk Management (TPCRM) can be a tedious, time-consuming task, yet it is a critical one. Third parties pose a significant source of risk for most businesses. According to Ponemon’s 2018 Data Risk in the Third-Party Ecosystem report, 59% of respondents had reported a third-party-related data… Read More
Supply Chain Cyber Risk
Tech Center
Vendor Risk Assessment Template

June 18, 2019

Vendor Risk Assessment Template
When you work with third parties, their risk is your risk. Common risks associated with vendors include everything from compliance risk to operational risk to financial and reputational loss. Vendor risk assessments can help your organization narrow down… Read More
Tech Center