Be Involved with Customer Security Audits — Answers Matter

Many companies that send out information security assessments have thousands of third parties that they’re sending them to. Because of this, they generally employ a red-flag model to identify any assessments that aren’t up to par. This isn’t necessarily a valid model to assess the security of another company, but it’s still the methodology that … Continue reading Be Involved with Customer Security Audits — Answers Matter