Risk

Five Best Practices to Manage and Control Third-Party Risk

Provided by CA Technologies

Category Risk

Type White Paper

Length 22

Publish Date May 17 2016

Date posted October 07 2016

Overview

Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited third-party user accounts are a common thread in many data breaches. And as your ecosystem of vendors grows, so does the challenge of defending against such attacks. This paper from CA provides five best practices for controlling third-party vendor risks.

Blogs

jon-collins

Thinking Different

Today’s tech can’t beat my stupid email response

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?