Industry NewsHIGH

Third-Party Risk - The Biggest Gap in Client Security Posture

Featured image for Third-Party Risk - The Biggest Gap in Client Security Posture
THThe Hacker News
Cynomithird-party risk managementSaaS securitydata breachcyber insurance
🎯

Basically, third-party risks are when vendors or tools your clients use can lead to security breaches.

Quick Summary

A new guide highlights the significant risks posed by third-party vendors to client security. Organizations must adapt their strategies to manage these risks effectively. Ignoring third-party vulnerabilities can lead to costly breaches and compliance issues.

What Happened

In today's interconnected business landscape, the next major data breach affecting your clients might not come from within their own systems. Instead, it could stem from a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor that internal IT teams are unaware of. This shift in the attack surface is highlighted in Cynomi's new guide, Securing the Modern Perimeter: The Rise of Third-Party Risk Management.

Why It Matters

The 2025 Verizon Data Breach Investigations Report revealed that third parties are involved in 30% of breaches. Moreover, the average remediation cost for a third-party breach is estimated at $4.91 million, according to IBM's 2025 Cost of a Data Breach Report. This makes third-party risk management (TPRM) not just a compliance issue but a critical security concern that organizations must address.

The Modern Perimeter Has Expanded

Historically, cybersecurity strategies focused on a defined perimeter, utilizing firewalls and identity management systems to protect internal assets. However, this boundary has dissolved. Client data now resides in various third-party SaaS applications and flows through vendor APIs. This means that security measures must extend beyond owned infrastructure to include an interconnected ecosystem of external providers.

From Checkbox to Core Risk Function

Traditional vendor risk management relied on annual questionnaires and spreadsheets, which are no longer sufficient. Regulatory frameworks like CMMC, NIS2, and DORA demand ongoing oversight of third-party controls. Boards are now asking tougher questions about vendor exposure, and cyber insurers are scrutinizing supply chain hygiene before issuing policies. The market is responding, with global TPRM spending projected to grow from $8.3 billion in 2024 to $18.7 billion by 2030.

Scaling TPRM Challenges

While many MSPs and MSSPs recognize the opportunity in TPRM, they often struggle with delivery. The traditional approach involves fragmented workflows and manual analysis, which can be costly and difficult to scale. Many providers currently view TPRM as a one-off project rather than a recurring managed service, limiting their potential.

Turning TPRM into a Revenue Engine

Third-party risk discussions are ongoing and can be initiated with every new vendor a client onboards. Effective TPRM keeps service providers embedded in client strategy, allowing them to offer broader security advisory work and build stronger client relationships. Providers who develop structured TPRM capabilities can differentiate themselves in a crowded market and signal maturity to prospective clients.

The Bottom Line

Third-party risk is a persistent issue that organizations cannot afford to ignore. As vendor ecosystems grow more complex, those who manage this exposure effectively will gain a significant advantage in resilience and compliance. Building a structured TPRM practice not only creates leverage but also positions service providers as integral partners in their clients' security programs. Cynomi's guide serves as a practical starting point for understanding and operationalizing TPRM at scale.

🔒 Pro insight: As third-party risks escalate, organizations must prioritize continuous oversight and governance to mitigate potential breaches and enhance resilience.

Original article from

THThe Hacker News
Read Full Article

Related Pings

MEDIUMIndustry News

CrowdStrike Teams Up with Microsoft for Next-Gen SIEM

CrowdStrike has integrated Microsoft Defender telemetry into its SIEM platform. This collaboration signifies a shift from rivalry to partnership, enhancing security solutions. Users can expect improved threat detection and response capabilities.

Dark Reading·
MEDIUMIndustry News

Cyber Industry Trends - Insights from RSAC 2026

The RSA Conference 2026 highlighted key trends in cybersecurity, especially the rise of AI. CISOs are adapting to these changes, but many still face challenges. Understanding these trends is vital for future security strategies.

CSO Online·
MEDIUMIndustry News

Microsoft Forces Upgrades for Unmanaged Windows 11 Devices

Microsoft is now automatically upgrading unmanaged Windows 11 24H2 devices to 25H2. This change affects users without IT management, making timely upgrades essential for security. Stay updated to avoid vulnerabilities as support for the older version ends soon.

BleepingComputer·
LOWIndustry News

Hacking History - Exploring the 1990s Hacker Culture

This episode explores the vibrant hacking culture of the 1990s. Featuring insights from iconic hackers, it reflects on their lasting impact on cybersecurity. Discover how early hackers shaped the digital world we live in today.

Risky Business·
LOWIndustry News

Codex - New Flexible Pricing Model for Teams Announced

Codex has launched a pay-as-you-go pricing model for ChatGPT Business and Enterprise. This flexible option allows teams to scale their use easily. It’s a game-changer for organizations looking to adopt AI solutions without heavy upfront costs.

OpenAI News·
MEDIUMIndustry News

OpenAI Acquires TBPN to Accelerate AI Conversations

OpenAI has acquired TBPN to enhance global discussions on AI and support independent media. This move aims to engage builders and businesses in meaningful dialogue. The impact could reshape perceptions of AI and foster collaboration across the tech community.

OpenAI News·