Third-Party Risk Management

Articles, news, and research on third-party risk management.

Third-Party Risk Management

Third-Party Risk Management

How to Calculate Risk Appetite for Third-Party Risk Management

Learn how to accurately calculate a risk appetite for your Third-Party Risk Management program (TPRM) in 2023.
Read more
Compliance and Regulations
Third-Party Risk Management

Meeting the Third-Party Risk Requirements of 23 NY CRR

Learn how to comply with the third-party risk management requirements of the new york cybersecurity legislation.
Read more
Third-Party Risk Management

Meeting the Third-Party Risk Requirements of NIST CSF in 2025

Learn how to comply with the supply chain risk management security requirements of NIST CSF 2.0
Read more
Third-Party Risk Management

Meeting the Third-Party Risk Requirements of PCI DSS in 2025

Learn which PCI requirements are relevant to the third-party risk management process and how the UpGuard platform can help comply with each requirement.
Read more
Third-Party Risk Management

How to Answer a Security Questionnaire: A 4-Step Guide

Learn best practices on how to answer a security questionnaire as a vendor.
Read more
Third-Party Risk Management

Top Tools to Mitigate Supply Chain Risks

Learn about the top supply chain risk management tools designed to help businesses identify, assess, and mitigate risks within their supply chains.​
Read more
Third-Party Risk Management

Top 3 Vendor Risk Assessment Frustrations - Can You Relate?

Can you relate to these common vendor risk assessment frustrations? Learn how to finally address them.
Read more
Cybersecurity
Third-Party Risk Management

9 Third-Party Risk Cyber Gaps in 2025

Understanding your existing third-party cybersecurity gaps allows you to better manage third-party risk. Learn more in this guide.
Read more
Third-Party Risk Management

What is a Security Questionnaire?

A security questionnaire helps organizations identify potential cybersecurity weaknesses among their third-party and even fourth-party vendors. Learn more.
Read more
Third-Party Risk Management

What is Cyber Risk Quantification? Definition + Calculation Guide

CRQ could help you prioritize risks that are most detrimental to your security posture.
Read more
Third-Party Risk Management

10 Ways to Reduce Cybersecurity Risk for Your Organization

Here are 10 strategies that you should implement to reduce cybersecurity risk for your organization.
Read more
Third-Party Risk Management

Vendor Management Best Practices in 2025

Vendor management is the process through which organizations steer service excellence, and minimize risks to obtain optimum benefits from their vendors.
Read more
Third-Party Risk Management

What is Fourth-Party Risk?

Fourth-party risk is the risk to your company posed by suppliers' suppliers. Learn more about why it's important to your organization and how to manage it.
Read more
Third-Party Risk Management

Vendor Tiering Best Practices: Categorizing Vendor Risks

Vendor tiering is the key to a more efficient Vendor Risk Management program. Learn about its best practices.
Read more
Cybersecurity
Third-Party Risk Management

What is Third-Party Risk?

Third-party risk is any risk brought on to an organization by external parties in its ecosystem or supply chain. Learn more about its importance.
Read more
Third-Party Risk Management
Cybersecurity

What is the Digital Supply Chain?

The digital supply chain uses a network approach to apply digital technologies throughout the supply chain, allowing better integration. Learn more.
Read more
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating