Blog

The Importance of Cybersecurity and Third Party Risk Management for Your Business

Ensuring that your business is not only up-to-date when it comes to its technology platforms, but also airtight from a security perspective is paramount in the modern era. Cyber security has burgeoned into a massive industry with layered intricacies, but there are basic practices to follow in order to maintain your security integrity. Teach employees […]


Phinity presenting at the IITPSA

ACCELERATE YOUR BUSINESS: Delivering a compelling presentation at the Institute of Information Technology Professionals South Africa, Phinity CTO Lee Bristow highlighted the importance of Identity & Access Governance (IAG) in mitigating and managing risk. While some systems can be cumbersome, utilising the Phinity cloud-based platform, and its variety of products available, can provide business owners […]


Phinity and CyberIAM announce STRATEGIC technology partnership

CyberIAM partnership

Phinity and CyberIAM are announcing a strategic partnership to provide advanced workflow and automation capabilities for customers. The firms are collaborating to deliver unique workflow and automation solutions focused on efficiency, that will streamline operations for customers implementing large scale Identity and Access Governance (IAG) capabilities. The Phinity cloud-based solution provides valuable information to streamline […]


Third Party Risk Management Conference

Phinity Risk Solutions, in partnership with Mobius, will be speaking at the first Third Party Risk Management Conference in South Africa. Come and join us as we share our gained insights into managing third-party risks. We will provide our view on how best to approach this complex process and how to get the best results. […]


Who Cares About Third Party Risk Management?

Your board of directors, the group risk officer, and those responsible for information privacy governance. And anyone within a multinational organisation involved in manufacturing, retail, education and financial services. In your organisation, can you honestly answer yes to the following? Are all your third-party risks being considered in the organisation’s overall approach to enterprise risk […]


Is risk ownership aligned to the board of directors?

Providing risk management with a dedicated home at board level allows for the clearer oversight and accountability of management and processes. In turn, this ensures sound governance practices and a focus on transforming risk management into a centre of excellence. The board of directors is where the risk “buck stops”. After all, this is the […]


Application Attack Surface

When assessing application risk, many organisations focus on the obvious: the software that they already know. They then proceed to overlook the full inventory of applications and code when reviewing digital assets. These ‘known’ applications typically have a high brand value or financial value, carry compliance requirements, or have been linked to previous breaches. The […]


What is DevSecOps?

What is DevSecOps? The term “DevSecOps” places information security into the original operating model of “DevOps”. DevOps itself refers to the collaborative operating team of software developers and IT operations staff. DevOps is common practice the world over. The trouble, though, is that it was built for agility, speed and reliability – not security. And […]


Third Party Risk Management Software for the Financial Sector

Regulators the world over are now holding financial institutions responsible for the actions of their third parties — thanks largely to the 2008 financial crisis and several high-profile attacks that leveraged third parties’ information security weaknesses. As a result, the financial services sector now requires strong third party risk management. The governance, compliance and regulatory […]


Third Party Risk Management Silver Lining is Industry Self-Regulation

In today’s business environment it’s impossible to find a company that doesn’t contract with a third-party vendor to provide services. However, the convenience, flexibility and opportunities of outsourcing to third parties comes with significant risks. The risks vary from industry to industry, the common threats being regulatory and the impact of a potential third-party vendor […]


Bitnami