CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Newsroom

Vendor Contract Do’s and Don’ts – BitSight Guest Blog

According to an Opus and Ponemon Institute study, 59% of companies have experienced a data breach caused by one of their vendors or Third Parties — while only 16% claim they effectively mitigate Third-Party risks.   Don’t be a part of these alarming statistics: In order to protect your organisation’s valuable information, it’s critical that you set…

LEARN MORE

GDPR’s 2nd Birthday – Are You Late To The Third Party?

As we see an ever-increasing stream of high-profile data breaches and regulatory fines Sean O’Brien, Director DVV Solutions, takes a look at one of the most common weak links in law firms’ data security and GDPR compliance programs – the risks posed by third parties and suppliers. The EU General Data Protection Regulation (GDPR) and…

LEARN MORE

BitSight Recognized as a 2020 Gartner Peer Insights Customers’ Choice for IT Vendor Risk Management Tools

DVV Solutions technology partner BitSight, the Standard in Security Ratings, today announced it has been named a 2020 Gartner Peer Insights Customers’ Choice for IT Vendor Risk Management (VRM) Tools. The Customers’ Choice distinction is based on verified customer reviews of the BitSight Security Ratings platform. BitSight is the only Security Ratings Service to earn this distinction,…

LEARN MORE

ProcessUnity Launches Vendor Cyber Intelligence with BitSight to Enhance Third-Party Risk Management Programs

Vendor Cyber Intelligence (VCI) is First in a Series of ProcessUnity Vendor Intelligence Capabilities Integrates Cybersecurity Ratings for Complete Vendor Oversight.   ProcessUnity, DVV Solutions partner and leading provider of cloud-based applications for risk and compliance management, today extended its Vendor Risk Management automation platform with new Vendor Cyber Intelligence (VCI) capabilities to incorporate industry…

LEARN MORE

Report Shows Cyber Attacks on Cloud Services Have Doubled

As cloud services increase in popularity, a worrying cybersecurity trend has emerged. According to the 2020 Trustwave Global Security Report, the volume of attacks on cloud services more than doubled in 2019 and accounted for 20% of investigated incidents. Although corporate and internal networks remain the most targeted domains, representing 54% of incidents, cloud environments are…

LEARN MORE

Supply Wisdom Granted Patent for Real-time & Continuous Risk Monitoring Solution

Patent covers Supply Wisdom’s proprietary technology & methodology for quantifying risk associated with Third Parties & geographic locations.   Supply Wisdom, the leader in real-time and continuous risk intelligence, announced today that the US Patent and Trademark Office has issued Patent No. 10,643,165B2 for its risk monitoring solution. The patent covers the technology and methodology used to…

LEARN MORE

POS Cybersecurity Under The Spotlight: BitSight Research Reveals Vulnerabilities in Point of Sales Systems

Study puts POS cybersecurity under the spotlight When people talk about cybersecurity risks, the first area that normally comes to mind is malware. Some might even consider that it’s the worst event that can happen, as it normally indicates that a malicious actor has already bypassed the layers of security and now has free-reign to…

LEARN MORE

Third Party Financial Health A Leading Indicator for All Areas of Risk – Output from Shared Assessments’ Working Groups

Complexity and uncertainty in the supply chain have increased exponentially in recent months leading to higher risk related to all aspects of third parties and supply chains. With the economic downturn expected to continue due to the destabilising impacts of COVID-19, members of the Shared Assessments’ Vertical Strategy Groups and Continuous Monitoring Working Groups collaborated…

LEARN MORE

Globalisation & Third Party Risk Oversight: Is Location Risk Monitoring on your Radar?

Globalisation has enabled, and in many cases demanded enterprises, both large and small, to generate value through a globally distributed third party network. Manufacturing in China, IT from India, outsourcing to the Philippines, and near-shoring with Mexico are results of a willingness to source globally and extract value and realise the benefits and unique advantages…

LEARN MORE

Understanding a Vendor’s Cybersecurity Risk – BitSight Guest Blog

Did you know that, according to an Opus and Ponemon Institute study, 59% of companies have experienced a data breach caused by one of their vendors or third parties? During these uncertain times, when many industries are shifting to an increasingly remote workforce, organisations may feel pressure to accommodate new business requirements by onboarding new…

LEARN MORE