The Growth of Machine Learning in Cybersecurity Creates New Third-Party Risks
Supply chain and third-party risks have been a top-of-mind security concern in recent years. Attacks such as Solarwinds and [...]
Supply chain and third-party risks have been a top-of-mind security concern in recent years. Attacks such as Solarwinds and [...]
On May 7, 2021, Colonial Pipeline Co. was the victim of a ransomware attack with far-reaching effects. The DarkSide [...]
Authored by: Eric Chan, Director of Strategy & GRC, Cybersecurity - MorganFranklin Consulting Third-Party Risk Management (TPRM) continues to [...]
The Institute of Internal Auditors (IIA) requires an External Quality Assessment Review (EQAR) at least every five years for the [...]
The Institute of Internal Auditors (IIA) requires an External Quality Assessment Review (EQAR) at least every five years for [...]
Due to heightened risks and to keep pace with the constantly evolving cybersecurity landscape, the National Institute of Standards [...]
The Cybersecurity Maturity Model Certification (CMMC) is an accreditation issued by the United States Department of Defense (DoD) for [...]
The Institute of Internal Auditors (IIA) requires an External Quality Assessment Review (EQAR) at least every five years for [...]
With the Institute of Internal Auditors (IIA) requiring a mandatory External Quality Assessment Review (EQAR) every five years, how [...]
As more companies have shifted to a SaaS model, the spend vs. utilization debate has emerged at the forefront. [...]