Third Party Risk

Third party suppliers and vendors can be your weakest security link.

  • Third Party Risk

    Third Party Risk

    Learn how Digital Shadows monitors, manages, and remediates third party risks to your business.

    Read Report
  • Read Full Report
  • Eliminating Third Party Cyber Risks from Healthcare Delivery57:15

    Eliminating Third Party Cyber Risks from Healthcare Delivery

    Hear from Associate Director Suzanne Schwartz from the Food and Drug Administration and Digital Shadows for an informative session on best practices for eliminating third party risks.

    Watch Video
  • Airline Boosts Cybersecurity Coverage to Protect Rewards Program Customers

    Airline Boosts Cybersecurity Coverage to Protect Rewards Program Customers

    With Digital Shadows SearchLight™, an airline discovered that a trove of frequent flyer accounts had been compromised and posted for sale online. Airline points can be sold on on criminal ...

    Read Report
  • Are your suppliers & partners putting you at risk?

    Let Us Show You
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Contractor Exposed Manufacturer's Sensitive Data

    Contractor Exposed Manufacturer's Sensitive Data

    Digital Shadows helped a manufacturing firm discover that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage).

    Read Report
  • Five Threats to Financial Services: Part Four, Payment Card Fraud

    Five Threats to Financial Services: Part Four, Payment Card Fraud

    Payment card information is the lifeblood of the cybercriminal ecosystem. In previous blogs in this series, we’ve focused on how ...

    Read Post
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.

    Read Report
  • 7 Ways the Digital Risk Revolution Changes Risk and Compliance53:06

    7 Ways the Digital Risk Revolution Changes Risk and Compliance

    CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.

    Watch Video
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • PoS System Infects Hotel Chain with Malware

    PoS System Infects Hotel Chain with Malware

    Digital Shadows helped a global hospitality and hotel chain discover that it's Point of Sale devices had been breached.

    Read Report
  • Episode 26: Mythbusting Vulnerabilities and Exploits

    Episode 26: Mythbusting Vulnerabilities and Exploits

    Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the...

    Read Post
  • Leveraging the 2018 Verizon Data Breach Investigations Report

    Leveraging the 2018 Verizon Data Breach Investigations Report

    Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 ...

    Read Post
  • Digital Shadows finds 1.5 billion business and consumer files exposed online1:29

    Digital Shadows finds 1.5 billion business and consumer files exposed online

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month prior to GDPR regulations.

    Watch Video
  • Lessons Learned from Equifax Breach

    Lessons Learned from Equifax Breach

    What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data breach.

    Read Report
  • Security Analyst Spotlight Series: Rafael Amado

    Security Analyst Spotlight Series: Rafael Amado

    Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant ...

    Read Post
  • The Business of Disinformation: A Taxonomy

    The Business of Disinformation: A Taxonomy

    The availability of tools found by Digital Shadows research team means that barriers to entry are lower than ever.

    Read Report
  • The Path to GDPR Compliance

    The Path to GDPR Compliance

    Are you ready? In May 2018, the European Union's new General Data Protection Regulation comes into force. Learn how to become compliant before then.

    Read Report
  • loading
    Loading More...