Third-Party Risk Management

Articles, news, and research on third-party risk management.

Third-Party Risk Management

Cybersecurity
Attack Surface Management
Third-Party Risk Management

What is Continuous Security Monitoring?

This is a complete overview of continuous security monitoring. Learn how to reduce cybersecurity risk with continuous security monitoring in this post.
Read more
Third-Party Risk Management

How to Select a Third-Party Risk Management Framework

Learn what a third-party risk management framework is and how to select the right one for your organization in this in-depth post.
Read more
Third-Party Risk Management

What is the Vendor Security Alliance Questionnaire (VSAQ)?

This is a complete overview of the Vendor Security Alliance (VSA) Questionnaire. Learn about how to use the VSA Questionnaire in this in-depth post.
Read more
Third-Party Risk Management

How to Manage Third-Party Risk in a World of Breaches

A comprehensive overview for managing third-party risk. Learn about common causes of third-party risks and how to mitigate them in this post.
Read more
Third-Party Risk Management
Data Breaches
Cybersecurity

The Amex Partner Data Breach and Downstream Liability

Learn more about the recent American Express data breach notification and what it means for cardholders worldwide.
Read more
Third-Party Risk Management

What is a Third-Party Vendor?

A third-party vendor is any entity that your organization does business with. This can include suppliers, manufacturers, service providers, and more.
Read more
Third-Party Risk Management

Vendor Risk Assessment Questionnaire Template: A Comprehensive Guide

Access a detailed vendor risk assessment questionnaire template to help your organization evaluate and manage third-party vendor risks effectively.
Read more
Third-Party Risk Management

Five Things You Need to Know About Third-Party Risk in 2025

Third and fourth party breaches account for over half of all data exposure. Here's what you need to know about third party cyber risk to protect you.
Read more
Attack Surface Management
Cybersecurity
Third-Party Risk Management

What are Security Ratings? Cybersecurity Risk Scoring Explained

This is a complete guide to security ratings and common use cases. Learn why security and risk management teams have adopted security ratings in this post.
Read more
Third-Party Risk Management
Compliance and Regulations

Top 11 Questionnaires for IT Vendor Assessment in 2025

This is a complete overview of the top 11 questionnaires for IT vendor assessment. Learn which security questionnaire is right for you in this in post.
Read more
Third-Party Risk Management

What is the SIG Questionnaire? SIG Core & Lite Compliance Guide

This is a complete overview of the Standardized Information Gathering (SIG) Questionnaire. Learn how to use the SIG Questionnaire in this in-depth post.
Read more
Third-Party Risk Management

Creating a Vendor Management Policy and Why You Need One

The purpose of a vendor management policy is to identify which vendors put your organization at risk and then define controls to minimize that risk.
Read more
Third-Party Risk Management
Cybersecurity

Third-Party Credentials and Vendor Risk: Safeguard Your Applications

Learn how to control access to your third-party credentials, and how they relate to vendor risk.
Read more
Third-Party Risk Management

What is Vendor Risk? The Big Impact of Third-Party Breaches

Data breaches by third-party vendors can damage your business, read on and learn about data breach types and third-party vendor risk.
Read more
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating