top of page


Nov 1, 20236 min read
Vendor Risk Assessment - Connecting the Dots
A new dimension of cybersecurity - correlating between business needs, cybersecurity tools, third-party vendors, and potential risks....


Jun 19, 20235 min read
Unmasking Business Email Compromise: Understanding, Identification, and Prevention
BEC. One of the most insidious threats in the modern digital landscape, causing billions of dollars losses worldwide.


May 11, 20233 min read
The Dark Side of ChatGPT and Implications for Supply Chain Security
Introduction: While AI-powered language models like ChatGPT have revolutionized various applications, they also inadvertently empower...


Apr 19, 20233 min read
Together we stand
Introduction: In an increasingly interconnected business landscape, organizations rely on a multitude of third-party vendors and partners...


Feb 27, 20231 min read
Suppliers Cybersecurity Ranking
Managing your supply chain helps you essence your organization's cybersecurity posture. To do that, we created this simple table to...


Jan 16, 20234 min read
Mind the Gap: Yearly Assessments for Third-Party, Supply-Chain Vendors
Yearly assessments of vendor security practices can help an organization identify potential security gaps and vulnerabilities in its network


Dec 22, 20226 min read
Mapping Your Third-party Providers Based on These Simple Rules
Without a reliable third-party risk management plan, it would be impossible for you
to add vendors to your supply chain without exposing you
bottom of page