Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
12:40 PM
Malwarebytes Labs
Malwarebytes Labs
Partner Perspectives

Vendor Security Alliance To Improve Cybersecurity Of Third-Party Providers

Member companies can use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses.

Nine companies -- Airbnb, Atlassian, Docker, Dropbox, GoDaddy, Palantir, Square, Twitter, and Uber -- recently founded the Vendor Security Alliance, an independent, non-profit coalition that aims to help member companies evaluate and assess the security and privacy of third-party providers that they heavily rely on and with whom they entrust their users’ most important data. The companies also have taken it upon themselves to standardize and create a benchmark of acceptable cybersecurity practices with which vendors need to comply.

In a blog post, George Totev of Atlassian gives readers a bird’s eye view of how the alliance will perform its duties:

We believe trust begins with transparency and accountability, and having an independent entity [to] manage this process for all its members will provide an efficient, common, and credible way of evaluating the vendors we all use. [For example] each cloud company will be evaluated, audited, and scored based on a set of common criteria that measures cybersecurity risk, policies, procedures, privacy, vulnerability management, and data security.

Each year, the VSA will create and push out a security and compliance questionnaire that companies can use to assess vendor risks based on a set of predetermined criteria. (Note that only members of the VSA can go through an independent auditing of vendors.) Once scored, vendors can then use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses.

The VSA made the first questionnaire available to the public on Oct. 1.

Ken Baylor, president of the VSA and head of compliance at Uber, explains why this alliance is an industry game changer:

Companies belonging to the VSA can draw on the collective expertise across the industry, gaining trust and verification of vendors’ security practices. The VSA will also enable companies to save time and money through the use of a standardized cybersecurity evaluation with real-time answers. The current way of evaluating cybersecurity risks and approving vendors can take several months -- the new VSA process cuts the process down to minutes.

It’s important to mention that the VSA is only one of several security groups that aim to address one part -- namely third-party security compliance and risks—of a complicated cybersecurity problem we all face.

In March 2009, eBay and ING announced the formation of the Cloud Security Alliance in order to promote best practices to assure secure cloud computing. Then in September of 2015, AirWatch formed the Mobile Security Alliance together with 10 other companies, aiming to mitigate the growing threat within the mobile threat landscape.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
11/12/2016 | 10:11:09 AM
I have a hard time describing my thoughts on content. but I really felt I should here. Your article is really great. I like the way you wrote this information.
User Rank: Moderator
11/12/2016 | 5:01:41 AM
prayer times

I really like your page and the of the author's style . I always loking for your new posts. Thank you, I really like it, it is useful

User Rank: Moderator
11/12/2016 | 5:01:15 AM
prayer times

I really like your page and the of the author's style . I always loking for your new posts. Thank you, I really like it, it is useful 

User Rank: Strategist
10/24/2016 | 10:39:51 AM
Vendor Security Alliance...
Great idea and makes a lot of sense. I think much like the utility model of cloud based IT Infrastructure services, Cyber Security Assurance services can mature and benefit from a standards based utility model that allows technology vendors a reasonable and predictable path to gain reasonable security assurance standard (and attestation) that a lot of consumer companies can subscribe to, without having to hire their own staff of cyber security assurance experts.

COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-10
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
PUBLISHED: 2020-08-10
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.
PUBLISHED: 2020-08-10
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.
PUBLISHED: 2020-08-10
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
PUBLISHED: 2020-08-10
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.