How to better monitor your downstream vendors The digital age has given birth to an abundance of news sources, some reporting quality journalism and others delivering only half truths, or worse. It’s a challenge to find the best source of information in our every day lives, and it’s an even greater challenge to find the most reliable technology to help security professionals do their jobs.No doubt that third-party vendors (and every vendor in the expansive supply chain) pose risks to the enterprise, and experts advise security practitioners to use some solution that helps monitor their downstream vendors.Lots of organizations rely on Google Alerts, but as more advanced AI technologies are developed, will there be newer more advanced solutions that can provide more accurate alerts?Vikram Mahidhar, senior vice president for AI solutions at Rage Frameworks, said, “Major enterprises are literally using Google Alerts to monitor their downstream vendors. It’s somewhat well-known Google Alerts both A) misses large amounts of unstructured content, and B) forces companies to rely on workers to manually churn through results.” In that churning process, there is a great likelihood that you are missing key signals about potential risk in your vendor chain, not to mention the resources that could otherwise be better used for more pressing assignments.“They’re not able to capture the local town newspaper report that a mill in Wisconsin just laid off half its workforce, and they happen to be the manufacturer one of your key vendors relies on,” said Mahidhar. Rage Frameworks is one of many AI solutions companies (because AI is all the rage these days). They have been working with companies around the globe using AI to monitor stock performance, evaluate contract agreements, spot revenue leakage and more. But lately, many enterprises have started to realize that with the increasing scale of their vendor network, there is no way they can monitor every digital news source across the globe.“We can use AI to see if a supplier just laid off half their workforce, or if their downstream vendor is embroiled in a costly legal battle. These are the signals that – if detected early enough – could help a company address a threat in their network before it takes them out with it,” Mahidhar said.Sifting through hundreds of thousands of sources and processing about a million pieces of information every day would be an impossible task for even an enormous team of human beings. “We are able to analyze all of this information at two levels–context and interpretation. We ask, ‘What does it mean for supplier A and supplier B?‘ Then we teach the machines how to read and interpret impact analysis,” Mahidhar said.The machines work line item by line item and understands, then derives a conclusion based on all the facts to determine whether that set of events is negative or positive. For instance, said Mahidhar, “If there is a supplier of a software, and somewhere there is an article that mentioned a lawsuit was filed. The machine would read all that and understand the magnitude of the lawsuit. That is aggregated and transmitted into a signal.”In the supplier risk market, there are lots of alerts that current technology doesn’t analyze using context and interpretation, so news about law suits and litigation, product recall, natural calamities, and other things that are going on, can go missing.“The bigger thing is context and interpretation. AI solutions are performing a task that has never been performed before,” said Mahidhar. If AI is able to put more scrutiny on the suppliers, the technology might be a better way for enterprises to monitor their vendor supply chain without having to rely on the use of critical resources. Related content news analysis Searching for unicorns: Managing expectations to find cybersecurity talent Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. By Kacy Zurkus Sep 29, 2017 4 mins IT Skills Careers IT Leadership feature Vulnerability vs. risk: Knowing the difference improves security Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks. By Kacy Zurkus Sep 26, 2017 3 mins Risk Management Vulnerabilities IT Leadership opinion What the Equifax breach means to me — an end user perspective Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in another massive breach? By Kacy Zurkus Sep 15, 2017 4 mins Cyberattacks DLP Software Internet Security opinion Abandoned mobile apps, domain names raise information security risks When app creators abandon domains for bigger, better deals, what happens to all the app-specific data? By Kacy Zurkus Sep 08, 2017 3 mins Access Control Data and Information Security Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe