Third-Party Risk Management
What is Continuous Security Monitoring?
This is a complete overview of continuous security monitoring. Learn how to reduce cybersecurity risk with continuous security monitoring in this post.
Read more
How to Select a Third-Party Risk Management Framework
Learn what a third-party risk management framework is and how to select the right one for your organization in this in-depth post.
Read more
What is the Vendor Security Alliance Questionnaire (VSAQ)?
This is a complete overview of the Vendor Security Alliance (VSA) Questionnaire. Learn about how to use the VSA Questionnaire in this in-depth post.
Read more
How to Manage Third-Party Risk in a World of Breaches
A comprehensive overview for managing third-party risk. Learn about common causes of third-party risks and how to mitigate them in this post.
Read more
The Amex Partner Data Breach and Downstream Liability
Learn more about the recent American Express data breach notification and what it means for cardholders worldwide.
Read more
What is a Third-Party Vendor?
A third-party vendor is any entity that your organization does business with. This can include suppliers, manufacturers, service providers, and more.
Read more
Vendor Risk Assessment Questionnaire Template: A Comprehensive Guide
Access a detailed vendor risk assessment questionnaire template to help your organization evaluate and manage third-party vendor risks effectively.
Read more
Five Things You Need to Know About Third-Party Risk in 2025
Third and fourth party breaches account for over half of all data exposure. Here's what you need to know about third party cyber risk to protect you.
Read more
What are Security Ratings? Cybersecurity Risk Scoring Explained
This is a complete guide to security ratings and common use cases. Learn why security and risk management teams have adopted security ratings in this post.
Read more
Top 11 Questionnaires for IT Vendor Assessment in 2025
This is a complete overview of the top 11 questionnaires for IT vendor assessment. Learn which security questionnaire is right for you in this in post.
Read more
What is the SIG Questionnaire? SIG Core & Lite Compliance Guide
This is a complete overview of the Standardized Information Gathering (SIG) Questionnaire. Learn how to use the SIG Questionnaire in this in-depth post.
Read more
Creating a Vendor Management Policy and Why You Need One
The purpose of a vendor management policy is to identify which vendors put your organization at risk and then define controls to minimize that risk.
Read more
Third-Party Credentials and Vendor Risk: Safeguard Your Applications
Learn how to control access to your third-party credentials, and how they relate to vendor risk.
Read more
What is Vendor Risk? The Big Impact of Third-Party Breaches
Data breaches by third-party vendors can damage your business, read on and learn about data breach types and third-party vendor risk.
Read more
Sign up for our newsletter
UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
