Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Supply Chain

Mitigating Third-Party Vendor Risk in Your Supply Chain

A recent survey by the analyst firm Gartner showed that 89% of companies experienced a supplier risk event in the last five years; however, those companies' overall awareness and plans to mitigate lacked maturity. As a result, it is no longer enough to secure your own company's infrastructure. You must also evaluate the risk posed by third-party vendors and plan to monitor those organizations for breaches.

6 Tips for Supply Chain Risk Management in 2022

Forrester recently predicted that in 2022, 60% of security incidents would involve third parties. Yikes! With such a large percentage of incidents taking place outside the confines of their organizations, corporate leaders need to know what to do to protect their business. So, here is a list of items to address to succeed at supply chain risk (SCR) management.

Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign

Supply chain compromises are an increasing threat that impacts a range of sectors, with threat actors leveraging access to support several motivations including financial gain (such as with the Kaseya ransomware attack) and espionage. Throughout 2020, an operation attributed to the Foreign Intelligence Service of the Russian Federation (SVR) by the U.S.

Blockchain in the food supply chain

We take it for granted that food will be on the shelves when we visit the supermarket, but the recent images of empty shops and warnings of shortages have shown us how fragile the supply chain can be. This has focused minds on the security and reliability of our food supply along with other issues such as food fraud, defects and safety recall, inefficiency and food provenance and traceability.

Securing the Digital Supply Chain - Why are Investors interested in the digital supply chain

In this session for the Securing the Digital Supply Chain we talk to two very well known investors from Silicon Valley - Mahendra Ramsinghani (Secure Octane) and Cherian Mathew (Firebolt VC). We learn what drives the investment thought process for these two successful VCs and also hear what their perspectives are on cybersecurity, areas of interest, how to think about the market. Especially interesting are the thoughts on "Who gets affected" from a Digital Supply Chain perspective.

The Supply Chain Needs Better Cybersecurity and Risk Management

The supply chain is under a historic amount of pressure, but the strain on its cybersecurity and risk management may be in even worse condition. As 2021 draws to a close, the global supply chain is in a state comparable to rush-hour traffic in bad weather. Everything seems to be backed up whether due to supply and demand issues, wait times at shipping ports, or any number of other delays.

How Vulnerability Management Secures Supply Chain and Production in Manufacturing

Manufacturing is one of those industries that seems like a natural fit for vulnerability management, in part because these companies can be such easy targets for cyber criminals. Manufacturers in many cases operate far-flung, global facilities including factories, warehouses, and other distribution points. Increasingly, these different facilities are connected as companies look to modernize their operations through digital transformation.

Riscosity - Securing The Digital Supply Chain - Thought Leaders - Ep. 1

In this episode of Securing the Digital Supply Chain Anirban Banerjee , CEO and co-founder of Riscosity talks to Atif Yusuf and Ravi Gunturi, two well known security leaders in the San Francisco Bay Area. Note - all opinions expressed here belong to the individuals only.

SCA Should Be in Your Toolbox to Address Supply Chain Risk

Software composition analysis (SCA) tools provide automated visibility throughout the software development life cycle (SDLC) for more efficient risk management, security, and license compliance. As organizations accelerate their digital initiatives, they rely on development teams both internally and externally to build the applications that will help them move forward. But applications are also a popular target for criminals.