Modern Day Vendor Security Compliance Begins with the STAR Registry

We require a modern approach to accurately assess our use of current technology.This month marks 25 years since I managed my first cybersecurity attack. At the time, I was CTO for an internet service provider that suffered the compromise, which in those days was mostly script kiddies defacing webpages to show they had circumvented what limited ACL protections we had in place.It was then that I was first introduced to audit principles, derived from the financial industry, as a means to demons…