Third-Party Risk Management

Articles, news, and research on third-party risk management.

Third-Party Risk Management

Third-Party Risk Management

Detecting AI in the Software Supply Chain

The UpGuard Research team measured exposure to AI in the supply chain across 250 popular companies to understand this growing risk.
Read more
Third-Party Risk Management

What is Supply Chain Risk Management (SCRM)?

Learn why supply chain risk management is important and how to expertly manage supply chain security risks
Read more
Third-Party Risk Management

Overview: Custom Questionnaire Builder by UpGuard

Learn about UpGuard's new custom questionnaire builder for vendor risk assessments.
Read more
Attack Surface Management
Data Breaches
Third-Party Risk Management

11 Ways to Prevent Supply Chain Attacks in 2025 (Highly Effective)

Supply chain attacks are on the rise. Follow these prevention tips to avoid falling victim to these devastating breaches.
Read more
Attack Surface Management
Data Breaches
Cybersecurity
Third-Party Risk Management

Honeytokens as a Defense Against Supply Chain Attacks

Supply chain attacks are on the rise but their attempts could be detected with Honeytokens. Learn how to implement them into your cybersecurity.
Read more
Third-Party Risk Management

What is Vendor Due Diligence? Choosing Secure Vendors in 2025

Your vendors need to follow stringent cybersecurity practices to protect you from cyberattacks. Learn the correct vendor due diligence process.
Read more
Third-Party Risk Management

What is the Consensus Assessments Initiative Questionnaire (CAIQ)?

This is a complete overview of the Consensus Assessments Initiative Questionnaire (CAIQ). Learn how to use the CAIQ in this in-depth post.
Read more
Third-Party Risk Management

Third-Party Risk Management Guide for 2025

Learn how to build and scale your third-party risk management program with expert guidance and a practical implementation checklist to minimize risk.
Read more
Third-Party Risk Management

Planning Your Vendor Security Assessment Questionnaire

Learn the 6 key steps to create effective vendor security assessment questionnaires in 2019, so you can better manage your vendor risk exposure.
Read more
Cybersecurity
Attack Surface Management
Third-Party Risk Management
Data Breaches

What is Defense in Depth?

Defense in depth is a cyber security strategy that uses a series of layered, redundant defensive measures to protect sensitive data, PII and other assets.
Read more
Compliance and Regulations
Data Breaches
Third-Party Risk Management
Attack Surface Management

What is Protected Health Information (PHI)?

Protected health information (PHI) is any information about health status, provision of health care or payment for health care that is created or collected
Read more
Third-Party Risk Management

Why is Third-Party Risk Management Important in 2025?

This is a complete overview that outlines why third-party risk management is important. Learn about successful TPRM programs in this in-depth post.
Read more
Data Breaches
Third-Party Risk Management
Cybersecurity

Spotify Resets User Passwords to Protect Against Third Party Data Breaches

The LinkedIn data breach compromised hundreds of thousands of passwords, leaving accounts wide open across numerous sites. Spotify took action.
Read more
Third-Party Risk Management
Data Breaches

9 Ways to Prevent Third-Party Data Breaches in 2025

This is a complete guide to preventing third-party data breaches. Learn about how organizations like yours are keeping themselves and their customers safe.
Read more
Cybersecurity
Attack Surface Management
Third-Party Risk Management
Data Breaches

What is Data Security?

Data security is the process of protecting sensitive data from unauthorized access and corruption throughout its lifecycle.
Read more
Third-Party Risk Management

Third-Party Risk Assessment Best Practices in 2025

This is a complete overview of the best practices for third-party risk assessment. Learn how to reduce your third-party risk exposure effectively.
Read more
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating