Blog
Page 66 of 152
What is a Digital Supply Chain?
In our increasingly digitized world, few business processes remain untouched by digital transformation. As disruptions to commerce become more common following events such as the COVID-19 pandemic, we can expect more of these business processes to make the transition to the digital age. The digitization of one process in particular — the supply chain — […]
May 27, 2022
5 Strategies to Improve Cyber Resilience to Resist Targeted Cyberattacks
Cyber attacks come in many forms, and most are a source of enormous frustration and anger for corporate security and compliance teams. Few attacks, however, are as frustrating – and dangerous – as a targeted attack. Targeted attacks are more like the cyber equivalent of hand-to-hand combat rather than a quick fleecing from online criminals […]
7 Steps Security Executives Can Take to Evolve Their Role
Security executives such as CISOs have seen their roles evolve rapidly over the past few years as cybersecurity rises to the forefront of board and C-suite concerns. Increasingly, business leaders are turning to their security professionals for answers. But they don’t want to hear the arcane details around firewalls and endpoint security measures. They want […]
How to Use Cyber Assurance Programs to Manage Risk Based on Business Outcomes
If you’ve been following any of our recent webinars or in-person presentations, you’ve heard us talk a lot about shifting the mindset from a focus on compliance to a risk-first approach. We’ve discussed that the best way to do this is to align your risk management program to specific outcomes, where compliance becomes a subset […]
May 25, 2022
Employee Spotlight: Tanja Miličić, Software Engineer
Software engineers are crucial to the success of SaaS companies like Reciprocity. So, we’re very lucky when we can have a software engineer like Tanja Miličić join the team. From developing application process integrations (aka APIs) to streamlining our real-time processing capabilities, she plays an important role in the development and maintenance of our award-winning […]
May 24, 2022
Reciprocity Offers Free Cyber Risk Assessment with New Community Edition of ROAR Platform
New Reciprocity Community Edition Enables Companies to Better Protect Themselves by Identifying, Understanding, and Acting on Risk within a Business Context – at No Cost SAN FRANCISCO, CA – May 24, 2022 – Reciprocity, a leader in information security risk and compliance, today announced the Reciprocity® Community Edition, a free version of Reciprocity’s AI-powered, integrated […]
Creating a Vendor Risk Management Framework
Global third-party suppliers have become an essential resource for many companies, providing crucial strategic and competitive support. Outsourcing, however, is not without its dangers. As dependency on third parties grows, so do the chances of supply chain, compliance, or reputation risks that hit your organization through those third parties. Your management team will need to […]
May 20, 2022
How to Manage and Mitigate Third-Party Operational Risk
Modern organizations face both operational risk and third-party risk. Operational risk refers to the risk of loss that can result from failed internal processes, people, or systems, or from external events; third-party risk refers to the chance of losses that arise from third parties in your supply chain network. Operational risk and third-party risk can, […]
Common Data Protection Challenges & How to Overcome Them
Organizations face more challenges around data protection today than ever before. Hence it’s critical to develop a data protection strategy that addresses these challenges, and to prepare for new ones that might develop in the future. In this article we’ll take a closer look at some of the common data protection challenges, and provide some […]
Best Practices for Digital Supply Chain Management
Digital transformation is redefining supply chains in almost every industry. These new-age supply chains are characterized by internet connectivity, digital communications, and cutting-edge technologies such as artificial intelligence (AI), the Internet of things (IoT), cloud computing, predictive analytics, and more. These next-generation networks leverage the power of data to shorten planning cycles, accelerate time-to-market, increase […]
Page 66 of 152