Industry NewsHIGH

Third-Party Risk - The Biggest Gap in Client Security Posture

Featured image for Third-Party Risk - The Biggest Gap in Client Security Posture
THThe Hacker News
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, third-party risks are when vendors or tools your clients use can lead to security breaches.

Quick Summary

A new guide highlights the significant risks posed by third-party vendors to client security. Organizations must adapt their strategies to manage these risks effectively. Ignoring third-party vulnerabilities can lead to costly breaches and compliance issues.

What Happened

In today's interconnected business landscape, the next major data breach affecting your clients might not come from within their own systems. Instead, it could stem from a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor that internal IT teams are unaware of. This shift in the attack surface is highlighted in Cynomi's new guide, Securing the Modern Perimeter: The Rise of Third-Party Risk Management.

Why It Matters

The 2025 Verizon Data Breach Investigations Report revealed that third parties are involved in 30% of breaches. Moreover, the average remediation cost for a third-party breach is estimated at $4.91 million, according to IBM's 2025 Cost of a Data Breach Report. This makes third-party risk management (TPRM) not just a compliance issue but a critical security concern that organizations must address.

The Modern Perimeter Has Expanded

Historically, cybersecurity strategies focused on a defined perimeter, utilizing firewalls and identity management systems to protect internal assets. However, this boundary has dissolved. Client data now resides in various third-party SaaS applications and flows through vendor APIs. This means that security measures must extend beyond owned infrastructure to include an interconnected ecosystem of external providers.

From Checkbox to Core Risk Function

Traditional vendor risk management relied on annual questionnaires and spreadsheets, which are no longer sufficient. Regulatory frameworks like CMMC, NIS2, and DORA demand ongoing oversight of third-party controls. Boards are now asking tougher questions about vendor exposure, and cyber insurers are scrutinizing supply chain hygiene before issuing policies. The market is responding, with global TPRM spending projected to grow from $8.3 billion in 2024 to $18.7 billion by 2030.

Scaling TPRM Challenges

While many MSPs and MSSPs recognize the opportunity in TPRM, they often struggle with delivery. The traditional approach involves fragmented workflows and manual analysis, which can be costly and difficult to scale. Many providers currently view TPRM as a one-off project rather than a recurring managed service, limiting their potential.

Turning TPRM into a Revenue Engine

Third-party risk discussions are ongoing and can be initiated with every new vendor a client onboards. Effective TPRM keeps service providers embedded in client strategy, allowing them to offer broader security advisory work and build stronger client relationships. Providers who develop structured TPRM capabilities can differentiate themselves in a crowded market and signal maturity to prospective clients.

The Bottom Line

Third-party risk is a persistent issue that organizations cannot afford to ignore. As vendor ecosystems grow more complex, those who manage this exposure effectively will gain a significant advantage in resilience and compliance. Building a structured TPRM practice not only creates leverage but also positions service providers as integral partners in their clients' security programs. Cynomi's guide serves as a practical starting point for understanding and operationalizing TPRM at scale.

🔒 Pro insight: As third-party risks escalate, organizations must prioritize continuous oversight and governance to mitigate potential breaches and enhance resilience.

Original article from

THThe Hacker News
Read Full Article

Related Pings

LOWIndustry News

Anjali Hansen - Emphasizes Cross-Team Collaboration in Privacy

Anjali Hansen shares her career journey and the vital role of cross-team collaboration in cybersecurity. Her insights highlight how teamwork strengthens data protection efforts across organizations.

CyberWire Daily·
LOWIndustry News

Jurassic Fish Chokes on Squid - A 150-Million-Year-Old Fossil

A 150-million-year-old fish fossil reveals it choked on a squid-like creature. This discovery highlights ancient marine life interactions and extinction events. Explore its significance today.

Schneier on Security·
MEDIUMIndustry News

Business Resilience - 6 Metrics IT Leaders Must Track

IT leaders must track six crucial metrics for business resilience. These metrics help manage risks and maintain operational continuity amid rising threats. Understanding and implementing these can safeguard your organization.

CSO Online·
MEDIUMIndustry News

Alcatraz Secures $50 Million for AI-Powered Security Solutions

Alcatraz has raised $50 million to enhance its AI-driven security systems. This funding will support its expansion into critical infrastructure markets. The investment addresses privacy concerns while improving access control.

SC Media·
MEDIUMIndustry News

Protecting Enterprise Value During Mergers and Acquisitions

Mergers and acquisitions can threaten enterprise value. Discover five strategies to protect it during these transitions. Safeguarding value is crucial for long-term success.

Proofpoint Threat Insight·
MEDIUMIndustry News

Internet Bug Bounty Program - Payouts Temporarily Paused

The Internet Bug Bounty program has paused all payouts for bug submissions. This affects researchers in open-source software, as AI changes how vulnerabilities are discovered. The shift raises concerns about the future of open-source security. Stay tuned for updates from HackerOne.

CSO Online·