top of page

3 Golden Rules For Managing Third-Party Security Risk

This is a good review of third party security management, specifically concerning how to know and manage your data.


Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d

bottom of page