Skip to content

Juniper Networks Patches Critical Third-Party Component Vulnerabilities “How to Make Exercise a Part of Your Regular Routine” “Creating a Consistent Exercise Habit”

Juniper Networks, a networking, cloud and cybersecurity solutions provider, this week released advisories detailing tens of vulnerabilities found across its product portfolio, including critical bugs in third-party components of Junos OS and STRM. One of the advisories addresses multiple critical-severity vulnerabilities in Expat (libexpat), a third-party stream-oriented XML parser library. Juniper’s advisory details 15 Expat… 

Webinar Tomorrow: Understanding Hidden Third-Party Identity Access Risks “How to Make Your Home More Eco-Friendly” “Creating an Eco-Friendly Home Environment”

Third-party access poses a number of risks to organizations who grant access to their sensitive data or systems. Organizations must take steps to properly manage these risks in order to protect their data and maintain the trust of their customers and partners. To better understand the potential risks, SecurityWeek and Saviynt are hosting a live… 

Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions “A Look at the Benefits of Eating Healthy” “Exploring the Advantages of a Nutritious Diet”

The world is increasingly reliant on digital systems and processes, making it more important than ever to ensure that our digital infrastructure is secure. As part of this effort, SecurityWeek is bringing together security experts to discuss the complexities of the supply chain problem and best practices for mitigating security issues. The Supply Chain &… 

Millions of AT&T Customers Notified of Data Breach at Third-Party Vendor “10 Reasons Why You Shouldn’t Miss Out On This Incredible Opportunity!”

US mobile phone carrier AT&T has recently notified millions of their wireless customers that their Customer Proprietary Network Information (CPNI) was compromised in a data breach at a third-party vendor. The breached vendor provides marketing services, and AT&T has reported that no personal or financial information was impacted. The emails sent to affected customers have… 

Shocking Findings from the 2023 Third-Party App Access Report

As SaaS-to-SaaS app installations are on the rise, organizations are presented with a unique challenge: how to control the proliferation of applications and the resulting risk to their data. In order to better understand the scope of the problem, Adaptive Shield has released a report on the risks and realities of third-party connected apps. Here… 

3 Steps to Automate Your Third-Party Risk Management Program

sources for the data points. Recent reports of data breaches that were either caused by an attack at a third party or sensitive information stored at a third-party location being exposed have made it abundantly clear that third-party data breaches don’t discriminate by industry. With more organizations sharing data with an average of 730 third-party…