Small-town street scene in Illinois American flag flapping in breeze by huge painted American flag fading from brick wall
 

Episode #41 - Both Sides of the Vendor Vetting Process

For some organizations, vendor vetting for cyber risk management is a process that runs like a well-oiled machine. For most, it's a tedious and challenging nightmare. This week, the guys discuss the vendor vetting process from both sides, vetting your vendors and navigating the vetting process of your prospects. They share how organizations of all sizes can use the vetting process to their advantage.

Pick up your copy of Cyber Rants on Amazon.
Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com
Be sure to rate the podcast, leave us a review, and subscribe!

Mike's Headlines:

Cyberattacks Use Office 365 to Target Supply Chain

Microsoft Notifies About an Ongoing Open Redirects Phishing Campaign

T-Mobile Hacker Used Brute Force Attack to Steal Customers’ Data

Fake DMCA Complaints, DDoS Threats Lead to Bazaloader Malware

Microsoft Azure Customers Warned of Critical Bug Found in Cosmos DB

Ransomware Attacks on U.S. Schools and Colleges Cost $6.62bn in 2020

Transcript