Third Party Risk Management - Consultancy, Assessment & Advisory
Third Party Risk Insights August 2020
This Month's Key Third Party Risk Management Articles & Reports
European Data Protection Board offers FAQ on Schrems EU-US Data protection judgement
Following the recent Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems judgement on the adequacy of the protection provided by the EU-US Data Protection Shield the EDPB issued an FAQ to provide clarity on the ruling and key regulatory impacts. Download the FAQ
Lessons Learned From The Garmin Cyberattack
Cybersecurity Ratings partner BitSight looks at how the recent high profile targeting of a consumer-services company like Garmin should serve as notice to CISO’s and business leaders everywhere that it’s time to start paying your attack surface the attention it deserves. Read the full article.
Gartner Names ProcessUnity a Leader in the 2020 Gartner Magic Quadrant for IT Vendor Risk Management Tools
Congratulations to our technology partner ProcessUnity on receiving two accolades from Gartner.
Gartner has named ProcessUnity a Leader in the 2020 Gartner Magic Quadrant for the 2nd consecutive year AND gave them the highest score for use case in the 2020 Gartner Critical Capabilities for IT Vendor Risk Management Tools. Learn more and Download the report
Data Security and Privacy Gaps Found in Video Doorbells by Consumer Reports' Tests
Video doorbells make it easy to see who’s at your door, a convenience that provides a sense of security. But like any internet-connected security camera, they’re also susceptible to hacking. So as part of Consumer Reports’ ongoing efforts to protect consumers from hackers, they recently conducted data security and data privacy tests on the 24 video doorbells in the Consumer Reports ratings, including five new models. See the full article.
Remote Exploit Flaw Found in Millions of Connected IoT Devices
An IoT vulnerability has been uncovered in a host of Thales products, which are found in millions of connected devices, including medical devices, and can be remotely exploited.
IBM X-Force Red security researchers uncovered a bug in components made by the manufacturerThales. The IoT vulnerability can be remotely exploited, allowing a hacker to take control of the device or access the enterprise network.Learn more.
Promo, "the world’s #1 marketing video maker” reveals a vulnerability in a third-party service led to breach of 14.6m users.
An Israeli marketing video firm this week announced a major breach of user data which appears to have impacted over 14 million accounts.
Promo, which describes itself as “the world’s #1 marketing video maker,” revealed in an online notice that a vulnerability in a third-party service was to blame for the incident, which also affected customers of its Slidely business. Read on.
Learn more about how DVV Solutions Third Party risk managed services can help you achieve operational resilience and enhance oversight in your cyber supply chain.