Innovation and Technology
Agile Third-Party Risk Management

Introduction to Third-Party Risk Management
Enterprise adoption of digital tools and platforms continues to accelerate, expanding the number of vendors, services, and partners organizations depend on to maintain day-to-day operations. But while this interconnectivity fuels agility and innovation, it also introduces a growing set of risks—many of which originate outside the organization.
Third-party ecosystems have become one of the most significant and complex parts of the enterprise attack surface. According to industry data, approximately 60% of data breaches in large organizations over the past year involved a third party. Despite that, Third-Party Risk Management remains one of the more outdated and fragmented areas of cybersecurity—often reliant on static assessments, manual questionnaires, and labor-intensive follow-ups.
As companies look to scale faster, they’re increasingly constrained by TPRM programs that can’t keep up. The question many CISOs are asking is: Can organizations grow without increasing their risk exposure?
The Growing Complexity of Vendor Relationships
Enterprises today rely on hundreds, if not thousands, of third-party vendors—ranging from SaaS providers and cloud platforms to contractors and managed service providers. The scale of these relationships, combined with the speed at which they’re adopted, presents a significant challenge for teams tasked with ensuring those vendors are secure and compliant.
The issue isn’t limited to volume. Traditional TPRM processes were designed for slower, more predictable procurement cycles. They often fall short when applied to decentralized decision-making and agile vendor onboarding models. And while technology in other areas of the enterprise has evolved rapidly, TPRM tools and workflows have largely stayed the same.
Saket Modi, co-founder and CEO of SAFE, described the core problem as more than just a tooling gap. “Traditional TPRM is a perfect storm of fragmentation, manual labor, and misaligned incentives,” Modi said.
He argues that while digital transformation has outpaced most organizational functions, TPRM has remained "tethered to spreadsheets, one-off tools, and reactive thinking."
TPRM Is Being Redefined
In response to these challenges, a new generation of solutions is emerging that seeks to rethink the structure of TPRM altogether. SAFE just announced its launch of what it describes as the industry’s first fully autonomous TPRM platform.
According to the company, the platform is built on a system of specialized AI agents that handle key parts of the vendor risk lifecycle—such as onboarding, assessments, and ongoing monitoring—with minimal human intervention. This agentic AI model enables the automation of previously manual workflows and provides continuous visibility into vendor risk.
SAFE claims the approach has resonated with customers, stating it has reached $10 million in annual recurring revenue from TPRM alone in less than one year, with adoption by enterprises like Instacart, Danaher, and Victoria’s Secret.
Modi distinguishes SAFE’s approach from traditional automation tools, emphasizing the difference between task execution and intelligent decision-making: “Automation executes tasks. Autonomy makes decisions,” he explained.
The platform reportedly integrates public data sources, questionnaire responses, and contract terms to evaluate third-party risk in real time, enabling security teams to scale oversight without proportional increases in headcount.
Strategic Implications for Security and the Business
Beyond operational efficiency, platforms that provide real-time, context-aware TPRM have the potential to deliver strategic benefits. Continuous risk intelligence allows executives to assess the potential impact of vendor decisions on broader business outcomes and regulatory exposure. It also supports better alignment between security teams, legal departments, and procurement functions.
When TPRM shifts from being a point-in-time check to a dynamic feedback loop, it changes how organizations think about trust, risk tolerance, and resource allocation. It also provides a stronger foundation for reporting and governance—particularly as regulatory frameworks such as the SEC’s cybersecurity disclosure rule and the EU’s DORA directive introduce stricter expectations for third-party oversight.
The Shift Toward Predictive TPRM
Looking forward, the TPRM market is expected to evolve beyond identification and into prediction. SAFE and others in the space anticipate capabilities that simulate risk scenarios, model potential attack paths, and provide proactive mitigation strategies before an incident occurs.
This next phase will likely emphasize deeper integration with enterprise systems, contract workflows, and external data feeds—enabling TPRM to be embedded at the speed of procurement rather than lagging behind it. It also suggests that security teams will need to be more data-driven, cross-functional, and equipped with tools that go beyond assessment to support decision-making.
Aligning Trust with Velocity
Organizations can’t afford for security processes to become bottlenecks. At the same time, moving too quickly without appropriate controls can introduce liabilities that are difficult to unwind.
Autonomous, AI-driven TPRM platforms point to a path forward—one that supports velocity without sacrificing visibility. Whether this approach becomes the industry standard remains to be seen, but there is growing consensus that managing third-party risk should be as agile and intelligent as the businesses it serves.
Conclusion
The evolution of Third-Party Risk Management towards more autonomous and AI-driven platforms is not just about keeping up with the speed of modern business; it’s about enabling it. By automating manual processes, providing real-time risk intelligence, and facilitating predictive risk management, these platforms can help organizations grow without increasing their risk exposure. As the TPRM landscape continues to evolve, it’s crucial for enterprises to stay ahead of the curve and adopt solutions that can support their velocity and agility.
FAQs
- What is Third-Party Risk Management (TPRM)?
TPRM refers to the processes and tools used by organizations to assess, monitor, and mitigate risks associated with third-party vendors, suppliers, and partners. - Why is traditional TPRM outdated?
Traditional TPRM relies heavily on manual processes, static assessments, and labor-intensive follow-ups, which cannot keep pace with the speed and complexity of modern business operations. - How does autonomous TPRM work?
Autonomous TPRM utilizes specialized AI agents to automate key parts of the vendor risk lifecycle, providing continuous visibility into vendor risk and enabling real-time decision-making. - What are the benefits of adopting autonomous TPRM platforms?
The benefits include operational efficiency, strategic decision-making, and the ability to scale oversight without proportional increases in headcount, ultimately supporting business agility and velocity. - What does the future of TPRM look like?
The future of TPRM is expected to involve predictive capabilities, deeper integration with enterprise systems, and a more data-driven approach to risk management, aiming to simulate risk scenarios and provide proactive mitigation strategies.
Innovation and Technology
The Best Virtual Reality Tools for Hybrid and Remote Teams: A Guide

As the world shifts towards hybrid and remote work, Tools for hybrid and remote work are becoming increasingly essential for team collaboration and productivity. In this article, we’ll explore the best virtual reality (VR) tools that can enhance the way teams work together, regardless of their geographical location. With the help of VR technology, teams can now collaborate more effectively, communicate more efficiently, and work more productively.
What are Virtual Reality Tools?
Virtual reality tools are software applications that utilize VR technology to create immersive and interactive environments for teams to collaborate and work together. These tools can be used for a variety of purposes, including virtual meetings, remote training, and team-building activities. With VR tools, teams can feel more connected and engaged, even when they are physically apart.
Benefits of Virtual Reality Tools
The benefits of using virtual reality tools for hybrid and remote teams are numerous. Some of the most significant advantages include:
* Enhanced collaboration and communication
* Increased productivity and efficiency
* Improved team engagement and morale
* Reduced costs associated with travel and meetings
* Increased accessibility and inclusivity for remote team members
Top Virtual Reality Tools for Hybrid and Remote Teams
There are many virtual reality tools available for hybrid and remote teams. Here are some of the most popular and effective options:
* VRChat: A social platform that allows teams to create their own avatars and interact with each other in a virtual environment.
* Google Meet: A video conferencing tool that allows teams to hold virtual meetings and collaborate in real-time.
* Facebook Spaces: A virtual reality platform that allows teams to create their own virtual spaces and interact with each other in a more immersive way.
* BigScreen: A virtual reality tool that allows teams to watch movies, play games, and collaborate in a virtual environment.
How to Choose the Right Virtual Reality Tool
Choosing the right virtual reality tool for your hybrid or remote team can be a daunting task. Here are some factors to consider when making your decision:
* Cost: Consider the cost of the tool and whether it fits within your team’s budget.
* Features: Consider the features that are most important to your team, such as video conferencing, screen sharing, and collaboration tools.
* Ease of use: Consider how easy the tool is to use and whether it requires any technical expertise.
* Compatibility: Consider whether the tool is compatible with your team’s devices and operating systems.
Best Practices for Using Virtual Reality Tools
To get the most out of virtual reality tools, it’s essential to follow best practices. Here are some tips to consider:
* Set clear goals and objectives: Clearly define what you want to achieve with your virtual reality tool and set specific goals and objectives.
* Establish a routine: Establish a regular routine for using the tool, such as weekly virtual meetings or daily check-ins.
* Encourage participation: Encourage all team members to participate and engage with the tool, even if they are not tech-savvy.
* Monitor progress: Monitor progress and adjust your strategy as needed to ensure you are getting the most out of the tool.
Common Challenges and Solutions
While virtual reality tools can be incredibly effective, there are also some common challenges that teams may face. Here are some solutions to consider:
* Technical issues: Consider having a technical support team on hand to troubleshoot any issues that may arise.
* Communication breakdowns: Consider establishing clear communication channels and protocols to prevent breakdowns.
* Team engagement: Consider incentivizing team members to participate and engage with the tool, such as through rewards or recognition.
Conclusion
In conclusion, virtual reality tools are a game-changer for hybrid and remote teams. By providing an immersive and interactive environment for teams to collaborate and work together, these tools can enhance productivity, efficiency, and team engagement. By following best practices and choosing the right tool for your team, you can unlock the full potential of virtual reality and take your team to the next level.
Frequently Asked Questions
Here are some frequently asked questions about virtual reality tools for hybrid and remote teams:
* Q: What is virtual reality? A: Virtual reality is a computer-generated simulation of a three-dimensional environment that can be experienced and interacted with in a seemingly real or physical way.
* Q: How do virtual reality tools work? A: Virtual reality tools use a combination of software and hardware to create an immersive and interactive environment for teams to collaborate and work together.
* Q: What are the benefits of using virtual reality tools for hybrid and remote teams? A: The benefits of using virtual reality tools for hybrid and remote teams include enhanced collaboration and communication, increased productivity and efficiency, and improved team engagement and morale.
* Q: How do I choose the right virtual reality tool for my team? A: Consider factors such as cost, features, ease of use, and compatibility when choosing a virtual reality tool for your team.
* Q: What are some best practices for using virtual reality tools? A: Best practices for using virtual reality tools include setting clear goals and objectives, establishing a routine, encouraging participation, and monitoring progress.
Innovation and Technology
Cybersecurity World On Edge As CVE Program Prepares To Go Dark

On April 16, a foundational piece of the world’s cybersecurity infrastructure may quietly grind to a halt. MITRE’s stewardship of the Common Vulnerabilities and Exposures program—a backbone of coordinated vulnerability disclosure for more than two decades—is facing an uncertain future as its U.S. Department of Homeland Security contract expires. Without confirmed renewal or replacement, the industry risks entering a period of dangerous opacity in vulnerability tracking.
What CVE and CWE Mean for Cybersecurity
For those outside the security trenches, it’s easy to overlook how essential the CVE and CWE – or Common Weakness Enumeration – programs have become. CVEs assign standardized identifiers to software vulnerabilities, making it easier for security researchers, vendors, and IT teams to communicate and prioritize fixes. The CWE program, a related effort, categorizes common coding errors that introduce those vulnerabilities in the first place. Together, they form the connective tissue for a global ecosystem of security tooling and coordination. From vulnerability scanners to patch management systems and threat intel feeds, thousands of tools and workflows rely on up-to-date CVE data. Vendors use CVEs to issue advisories and coordinate disclosures. Security teams use them to track risks and drive remediation. Even government agencies like CISA and the DoD rely on CVEs as a core part of their threat modeling and defensive planning.
MITRE’s Contract Expires—and There’s No Backup Plan
MITRE has confirmed that its DHS contract to manage the CVE and CWE programs is set to lapse on April 16, 2025, and as of now, no renewal has been finalized. This contract, renewed annually, has funded critical work to keep the CVE program running, including updates to the schema, assignment coordination, and vulnerability vetting. “Failure to renew MITRE’s contract for the CVE program, seemingly set to expire on April 16, 2025, risks significant disruption,” said Jason Soroko, Senior Fellow at Sectigo. “A service break would likely degrade national vulnerability databases and advisories. This lapse could negatively affect tool vendors, incident response operations, and critical infrastructure broadly. MITRE emphasizes its continued commitment but warns of these potential impacts if the contracting pathway is not maintained.”
A Single Point of Failure in a Global System
Greg Anderson, CEO and founder of DefectDojo, voiced what many in the community are feeling: “MITRE’s confirmation that it is losing DHS funding to maintain the Common Vulnerabilities and Exposures (CVE) program should concern every cybersecurity professional around the world, especially considering that the funding expires tomorrow—leaving no room for anything to be built in its place.” Anderson added a sobering thought experiment: “If, as expected, the database goes offline tomorrow and only GitHub records remain, every security team has just lost an essential resource for early warnings and a cohesive framework for naming and addressing vulnerabilities.” He explained the risks of a fragmented landscape: “To illustrate, say a new vulnerability in encryption used across the internet emerges. Without the CVE program, one non-governing body may name the issue ‘The worst encryption flaw ever,’ but another non-governing body names the issue ‘A terrible encryption flaw,’ both not using the CVE-20XX-XXXX identification protocol. Without CVEs, how do we even know we’re talking about the same issue?”
Government Scramble and Industry Alarm
MITRE has said that discussions with the U.S. government are active and that it remains committed to the CVE mission. But with the expiration date looming, time is running short—and the consequences of even a temporary gap are severe. “Hopefully this situation gets resolved quickly,” said Casey Ellis, founder at Bugcrowd. “CVE underpins a huge chunk of vulnerability management, incident response, and critical infrastructure protection efforts. A sudden interruption in services has the very real potential to bubble up into a national security problem in short order.” Across the cybersecurity ecosystem—from vendors to government agencies—the call is the same: resolve this, and fast.
This Is a Wake-Up Call
Whether funding is restored in time or not, this moment should serve as a wake-up call for the industry and policymakers alike. A program as vital as CVE should not be hanging by a thread every April. It needs stable, long-term funding and a robust governance model that ensures continuity, even in the face of bureaucratic delays or shifting political winds. Cyber threats are evolving faster than ever. Shutting down the CVE program – even briefly – would be like turning off air traffic control mid-flight. This isn’t just about maintaining a database. It’s about maintaining trust in the systems that protect us all.
Conclusion
The potential shutdown of the CVE program due to lack of funding is a critical issue that affects the entire cybersecurity community. The program’s importance cannot be overstated, as it provides a standardized way of identifying and addressing vulnerabilities. Without it, the industry would be plunged into darkness, making it difficult to coordinate vulnerability disclosures and prioritize fixes. It is essential that the U.S. government and other stakeholders take immediate action to ensure the program’s continued operation.
FAQs
- What is the CVE program?
The CVE program is a foundational piece of the world’s cybersecurity infrastructure that assigns standardized identifiers to software vulnerabilities, making it easier for security researchers, vendors, and IT teams to communicate and prioritize fixes. - What is the impact of the CVE program shutdown?
The shutdown of the CVE program would have a significant impact on the cybersecurity community, making it difficult to coordinate vulnerability disclosures and prioritize fixes. It would also lead to a fragmented landscape, where security teams would have to gather and consolidate information in a piecemeal fashion, wasting valuable time that could be spent addressing the issues. - What is the current status of the CVE program funding?
The current contract for the CVE program is set to expire on April 16, 2025, and as of now, no renewal has been finalized. - What can be done to prevent the CVE program shutdown?
The U.S. government and other stakeholders must take immediate action to ensure the program’s continued operation by providing stable, long-term funding and a robust governance model that ensures continuity. - Why is the CVE program important?
The CVE program is important because it provides a standardized way of identifying and addressing vulnerabilities, which is essential for maintaining trust in the systems that protect us all.
Innovation and Technology
Big Data, Little Data, and Everything in Between: Strategies for Leveraging Digital Insights

As companies embark on digital transformation strategies, they are faced with an overwhelming amount of data that can be both a blessing and a curse. With the right approach, this data can be leveraged to drive business growth, improve customer experiences, and gain a competitive edge. In this article, we will explore the world of big data, little data, and everything in between, and provide strategies for leveraging digital insights to drive business success.
Understanding Big Data
Big data refers to the large amounts of structured and unstructured data that organizations collect from various sources, including social media, customer interactions, and sensor data. This data can be analyzed to identify patterns, trends, and insights that can inform business decisions. Big data analytics involves using advanced tools and techniques, such as machine learning and natural language processing, to extract insights from large datasets.
Benefits of Big Data
The benefits of big data are numerous, including improved customer experiences, increased operational efficiency, and enhanced decision-making. By analyzing large amounts of data, organizations can gain a deeper understanding of their customers, identify areas of inefficiency, and make data-driven decisions that drive business growth.
Challenges of Big Data
However, working with big data also presents several challenges, including data quality issues, scalability, and security concerns. Ensuring the accuracy and completeness of large datasets can be a significant challenge, and analyzing and storing large amounts of data can require significant investments in infrastructure and technology.
Understanding Little Data
Little data, on the other hand, refers to the small, focused datasets that are often overlooked in the era of big data. Little data can be just as valuable as big data, as it can provide insights into specific business problems or customer needs. Little data analytics involves using simple tools and techniques, such as spreadsheets and statistical analysis, to extract insights from small datasets.
Benefits of Little Data
The benefits of little data include its ease of use, low cost, and ability to provide quick insights into specific business problems. Little data can be used to identify areas for improvement, measure the effectiveness of marketing campaigns, and inform product development decisions.
Challenges of Little Data
However, little data also has its limitations, including its limited scope and potential for bias. Little data may not provide a complete picture of a business problem, and its insights may not be generalizable to other areas of the organization.
Everything in Between
In reality, most organizations work with a combination of big data and little data, using a range of tools and techniques to extract insights from different types of datasets. This approach is often referred to as “medium data,” and it involves using a mix of big data analytics and little data analytics to drive business decisions.
Benefits of Medium Data
The benefits of medium data include its ability to provide a balanced view of business problems, its flexibility, and its cost-effectiveness. Medium data can be used to identify patterns and trends in large datasets, while also providing insights into specific business problems or customer needs.
Challenges of Medium Data
However, working with medium data also presents several challenges, including the need for advanced analytics skills, the potential for data overload, and the requirement for significant investments in technology and infrastructure.
Strategies for Leveraging Digital Insights
To leverage digital insights and drive business success, organizations should consider the following strategies:
Develop a Data-Driven Culture
Developing a data-driven culture involves creating an organization that is focused on using data to drive business decisions. This requires investing in data analytics tools and techniques, as well as providing training and support to employees.
Use a Combination of Big Data and Little Data
Using a combination of big data and little data can provide a balanced view of business problems and customer needs. This approach involves using big data analytics to identify patterns and trends, and little data analytics to provide insights into specific business problems.
Invest in Advanced Analytics Tools
Investing in advanced analytics tools, such as machine learning and natural language processing, can help organizations extract insights from large datasets. These tools can be used to analyze big data, little data, and medium data, and provide insights that drive business decisions.
Focus on Data Quality
Ensuring the accuracy and completeness of datasets is critical to driving business success. Organizations should focus on data quality, and invest in data governance and data management practices that ensure the integrity of their data.
Real-World Examples
Several organizations have successfully leveraged digital insights to drive business success. For example, Walmart uses big data analytics to optimize its supply chain and improve customer experiences. On the other hand, small businesses like coffee shops use little data analytics to inform marketing decisions and improve customer loyalty.
Conclusion
In conclusion, big data, little data, and everything in between can provide valuable insights that drive business success. By understanding the benefits and challenges of each approach, and using a combination of big data and little data, organizations can leverage digital insights to drive business growth, improve customer experiences, and gain a competitive edge. Developing a data-driven culture, using advanced analytics tools, and focusing on data quality are critical strategies for leveraging digital insights and driving business success.
Frequently Asked Questions
What is big data?
Big data refers to the large amounts of structured and unstructured data that organizations collect from various sources, including social media, customer interactions, and sensor data.
What is little data?
Little data refers to the small, focused datasets that are often overlooked in the era of big data. Little data can be just as valuable as big data, as it can provide insights into specific business problems or customer needs.
How can organizations leverage digital insights to drive business success?
Organizations can leverage digital insights to drive business success by developing a data-driven culture, using a combination of big data and little data, investing in advanced analytics tools, and focusing on data quality.
What are the benefits of big data?
The benefits of big data include improved customer experiences, increased operational efficiency, and enhanced decision-making.
What are the challenges of big data?
The challenges of big data include data quality issues, scalability, and security concerns.
What are the benefits of little data?
The benefits of little data include its ease of use, low cost, and ability to provide quick insights into specific business problems.
What are the challenges of little data?
The challenges of little data include its limited scope and potential for bias.
-
Career Advice4 months ago
Interview with Dr. Kristy K. Taylor, WORxK Global News Magazine Founder
-
Diversity and Inclusion (DEIA)4 months ago
Sarah Herrlinger Talks AirPods Pro Hearing Aid
-
Career Advice4 months ago
NetWork Your Way to Success: Top Tips for Maximizing Your Professional Network
-
Changemaker Interviews4 months ago
Unlocking Human Potential: Kim Groshek’s Journey to Transforming Leadership and Stress Resilience
-
Diversity and Inclusion (DEIA)4 months ago
The Power of Belonging: Why Feeling Accepted Matters in the Workplace
-
Global Trends and Politics4 months ago
Health-care stocks fall after Warren PBM bill, Brian Thompson shooting
-
Global Trends and Politics4 months ago
Unionization Goes Mainstream: How the Changing Workforce is Driving Demand for Collective Bargaining
-
Training and Development4 months ago
Level Up: How Upskilling Can Help You Stay Ahead of the Curve in a Rapidly Changing Industry