Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Common Security Gaps a Cyber Fusion Center Can Help Close in Your Organization

A cyber fusion center brings together threat intelligence, incident response, and security operations into one integrated hub. Many organizations struggle with gaps because their teams operate in silos. IT may focus on uptime, compliance may worry about regulations, and security might chase alerts. The result is a fragmented defense, where issues slip through unnoticed until they cause real damage.

6 Ways Technology Strengthens Supply Chain Compliance and Security

More than 80% of global trade by volume moves through maritime routes, according to the United Nations Conference on Trade and Development. Each container crossing borders carries not just goods, but pages of documentation, compliance checks, and security verifications. Managing all this manually leaves room for costly mistakes and unnecessary delays.

Shai-Hulud Worm: Another Reminder of the Need for Supply Chain Defenses

The Shai-Hulud worm recently compromised more than 500 NPM packages, including the popular @ctrl/tinycolor, which alone receives over two million weekly downloads. This marks the first self-propagating supply chain attack in the NPM ecosystem, with the malware harvesting cloud credentials, backdooring GitHub Actions, and spreading automatically to other maintainer packages. While this incident is unprecedented in its automation, supply chain attacks are not new.

From Silos to Synergy: Unifying Your Security Tools for a Stronger More Resilient Software Supply Chain

In the race to secure today’s ever-expanding attack surface, many companies have made a practice of using a mix of tools to monitor, assess, and remediate threats. This practice has resulted in a fragmented and chaotic landscape of security solutions across several teams, increasing complexity and forcing companies to have a reactive vs. proactive security posture.

Secure Your Software Supply Chain: A CISO's Imperative in the SDLC

From customer-facing applications to internal systems, your businesses run on code. As CISOs, you may know that this reliance comes with a growing, complex challenge: securing the Software Development Lifecycle (SDLC) from end to end, especially against the insidious threat of software supply chain attacks.

How GitHub Plans to Fix the Supply Chain - The 443 Podcast - Episode 345

This week on the podcast, we discuss Cisco's recent zero-day vulnerabilities before covering a Microsoft Threat Intelligence post on a phishing campaign that abuses SVG files. After that, we review GitHub's proposed changes for securing the open source software supply chain.

The Weak Link: Recent Supply Chain Attacks Examined

Originally published: April 2023 Updated: September 2025 Supply chain attacks are a growing and increasingly sophisticated form of cyber threat. They target the complex network of relationships between organizations and their suppliers, vendors, and third-party service providers. These attacks exploit vulnerabilities that emerge due to the interconnected nature of digital supply chains, which often span multiple organizations, systems, and geographies.

EP 16 - Sensing the signals: The hidden risks in digital supply chains

Modern digital supply chains are increasingly complex and vulnerable. In this episode of Security Matters, host David Puner is joined by Retsef Levi, professor of operations management at the MIT Sloan School of Management, to explore how organizations can “sense the signals” of hidden risks lurking within their software supply chains, from open source dependencies to third-party integrations and AI-driven automation.

LevelBlue Spotlight Report Finds Manufacturers Struggling with the Impact of AI and Supply Chain Risk

LevelBlue’s newly released 2025 Spotlight Report: Cyber Resilience and Business Impact in Manufacturing, uncovered the different ways this sector has increased its understanding of the role cybersecurity must play moving forward, including the need to adopt a more proactive security posture to increase resilience and improve its defense mechanisms to combat AI-powered attacks.