For some organizations, vendor vetting for cyber risk management is a process that runs like a well-oiled machine. For most, it's a tedious and challenging nightmare. This week, the guys discuss the vendor vetting process from both sides, vetting your vendors and navigating the vetting process of your prospects. They share how organizations of all sizes can use the vetting process to their advantage.
Pick up your copy of Cyber Rants on Amazon.
Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com.
Be sure to rate the podcast, leave us a review, and subscribe!
Cyberattacks Use Office 365 to Target Supply Chain
Microsoft Notifies About an Ongoing Open Redirects Phishing Campaign
T-Mobile Hacker Used Brute Force Attack to Steal Customers’ Data
Fake DMCA Complaints, DDoS Threats Lead to Bazaloader Malware
Microsoft Azure Customers Warned of Critical Bug Found in Cosmos DB
Ransomware Attacks on U.S. Schools and Colleges Cost $6.62bn in 2020