When Everything Old is New, Again

Once upon a time…Some of us, those with mostly grey hair, more or less, may recall days without mobile phones, notebook computers, or even desktop devices. I know, I know, and we were all chased by dinosaurs to school, uphill, both ways, while hauling bookbags bursting with textbooks and homework, in blizzards…I get it. But[…]

The Urgency of Insecure Infrastructure; Yours, Mine, and All Ours

There are lessons to be learned from the Colonial Pipeline ransomware attack. Panic is not one of them—it will yield no improvement nor progress for any situation. The event does strongly highlight how much more attention we need to pay to cyber risk now than past efforts demonstrate. The details of this ransomware incident are[…]

Integrating Third Party Data Into Your Risk Management Processes (TPRM)

Some Risk Managers rely upon reported findings from internal risk assessments as the primary source of risk data in their Third Party Risk Management (TPRM) programs. Too often this approach generalizes over time from a primary to an exclusive source. That’s a missed opportunity to leverage value from other contributors to your operations, by incorporating[…]

A Look At DoubleCheck’s Approach to TPRM (Third Party Risk Management)

This month, I’m going to depart a bit from the independent discussions of IT risk and cybersecurity to explore some of the specific ways this blog’s host, DoubleCheck Software, provides tools, resources, and value to companies working to manage their supply chain and partner risk—TPRM (Third Party Risk Management). The DoubleCheck GRC offers a platform[…]


DoubleCheck Third Party Risk Management.

Now with access to D&B® data for key insights about your 3rd parties.