Third Party Risk

Third party suppliers and vendors can be your weakest security link.

  • Third Party Risk

    Third Party Risk

    Learn how Digital Shadows monitors, manages, and remediates third party risks to your business.

    Read Report
  • Eliminating Third Party Cyber Risks from Healthcare Delivery57:15

    Eliminating Third Party Cyber Risks from Healthcare Delivery

    Hear from Associate Director Suzanne Schwartz from the Food and Drug Administration and Digital Shadows for an informative session on best practices for eliminating third party risks.

    Watch Video
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • Are your suppliers & partners putting you at risk?

    Let Us Show You
  • Contractor Exposed Manufacturer's Sensitive Data

    Contractor Exposed Manufacturer's Sensitive Data

    Digital Shadows helped a manufacturing firm discover that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage).

    Read Report
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • 7 Ways the Digital Risk Revolution Changes Risk and Compliance53:06

    7 Ways the Digital Risk Revolution Changes Risk and Compliance

    CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.

    Watch Video
  • Why Digital Risk Management Should Be a Priority

    Learn More
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • PoS System Infects Hotel Chain with Malware

    PoS System Infects Hotel Chain with Malware

    Digital Shadows helped a global hospitality and hotel chain discover that it's Point of Sale devices had been breached.

    Read Report
  • Episode 26: Mythbusting Vulnerabilities and Exploits

    Episode 26: Mythbusting Vulnerabilities and Exploits

    Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the...

    Read Post
  • Leveraging the 2018 Verizon Data Breach Investigations Report

    Leveraging the 2018 Verizon Data Breach Investigations Report

    Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 ...

    Read Post
  • Digital Shadows finds 1.5 billion business and consumer files exposed online1:29

    Digital Shadows finds 1.5 billion business and consumer files exposed online

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month prior to GDPR regulations.

    Watch Video
  • Lessons Learned from Equifax Breach

    Lessons Learned from Equifax Breach

    What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data breach.

    Read Report
  • Security Analyst Spotlight Series: Rafael Amado

    Security Analyst Spotlight Series: Rafael Amado

    Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant ...

    Read Post
  • The Business of Disinformation: A Taxonomy

    The Business of Disinformation: A Taxonomy

    The availability of tools found by Digital Shadows research team means that barriers to entry are lower than ever.

    Read Report
  • The Path to GDPR Compliance

    The Path to GDPR Compliance

    Are you ready? In May 2018, the European Union's new General Data Protection Regulation comes into force. Learn how to become compliant before then.

    Read Report
  • Account Takeover: Protect Your Customer and Employee Accounts

    Account Takeover: Protect Your Customer and Employee Accounts

    Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them.

    Read Report
  • 3 Steps to Protect Your Organization From Digital Risks Across the Open Deep and Dark Web58:41

    3 Steps to Protect Your Organization From Digital Risks Across the Open Deep and Dark Web

    In this live webinar with Forrester Research's Nick Hayes and Digital Shadows' Rick Holland, you will learn why it is critical to monitor and manage digital risk across the widest range of data source

    Watch Video
  • [Infographic] 18 Reasons for Digital Risk Management

    [Infographic] 18 Reasons for Digital Risk Management

    Learn 18 reasons why your organization needs digital risk management in this infographic.

    Read Report
  • 6 Considerations When Purchasing Threat Intelligence

    6 Considerations When Purchasing Threat Intelligence

    When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to assess threat intelligence providers across six critical categories.

    Read Report
  • Company Office Plan Leaked Online

    Company Office Plan Leaked Online

    Digital Shadows helped the Security Manager of a healthcare provider discover an unsecured File Transfer Protocol (FTP) server that included a PDF file of a blueprint for the client's office space.

    Read Report
  • loading
    Loading More...