Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
12:40 PM
Malwarebytes Labs
Malwarebytes Labs
Partner Perspectives

Vendor Security Alliance To Improve Cybersecurity Of Third-Party Providers

Member companies can use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses.

Nine companies -- Airbnb, Atlassian, Docker, Dropbox, GoDaddy, Palantir, Square, Twitter, and Uber -- recently founded the Vendor Security Alliance, an independent, non-profit coalition that aims to help member companies evaluate and assess the security and privacy of third-party providers that they heavily rely on and with whom they entrust their users’ most important data. The companies also have taken it upon themselves to standardize and create a benchmark of acceptable cybersecurity practices with which vendors need to comply.

In a blog post, George Totev of Atlassian gives readers a bird’s eye view of how the alliance will perform its duties:

We believe trust begins with transparency and accountability, and having an independent entity [to] manage this process for all its members will provide an efficient, common, and credible way of evaluating the vendors we all use. [For example] each cloud company will be evaluated, audited, and scored based on a set of common criteria that measures cybersecurity risk, policies, procedures, privacy, vulnerability management, and data security.

Each year, the VSA will create and push out a security and compliance questionnaire that companies can use to assess vendor risks based on a set of predetermined criteria. (Note that only members of the VSA can go through an independent auditing of vendors.) Once scored, vendors can then use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses.

The VSA made the first questionnaire available to the public on Oct. 1.

Ken Baylor, president of the VSA and head of compliance at Uber, explains why this alliance is an industry game changer:

Companies belonging to the VSA can draw on the collective expertise across the industry, gaining trust and verification of vendors’ security practices. The VSA will also enable companies to save time and money through the use of a standardized cybersecurity evaluation with real-time answers. The current way of evaluating cybersecurity risks and approving vendors can take several months -- the new VSA process cuts the process down to minutes.

It’s important to mention that the VSA is only one of several security groups that aim to address one part -- namely third-party security compliance and risks—of a complicated cybersecurity problem we all face.

In March 2009, eBay and ING announced the formation of the Cloud Security Alliance in order to promote best practices to assure secure cloud computing. Then in September of 2015, AirWatch formed the Mobile Security Alliance together with 10 other companies, aiming to mitigate the growing threat within the mobile threat landscape.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
11/12/2016 | 10:11:09 AM
I have a hard time describing my thoughts on content. but I really felt I should here. Your article is really great. I like the way you wrote this information.
User Rank: Moderator
11/12/2016 | 5:01:41 AM
prayer times

I really like your page and the of the author's style . I always loking for your new posts. Thank you, I really like it, it is useful

User Rank: Moderator
11/12/2016 | 5:01:15 AM
prayer times

I really like your page and the of the author's style . I always loking for your new posts. Thank you, I really like it, it is useful 

User Rank: Strategist
10/24/2016 | 10:39:51 AM
Vendor Security Alliance...
Great idea and makes a lot of sense. I think much like the utility model of cloud based IT Infrastructure services, Cyber Security Assurance services can mature and benefit from a standards based utility model that allows technology vendors a reasonable and predictable path to gain reasonable security assurance standard (and attestation) that a lot of consumer companies can subscribe to, without having to hire their own staff of cyber security assurance experts.

COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...