CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Software Supply Chain Attacks
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Software Supply Chain Attacks

CEO at the table in front of laptop showing software supply chain attacks
Cyber SecurityInsights

Software Supply Chains Are Under Attack. Here’s What CEOs Need To Do

December 24, 2021
Software supply chain attacks will continue to be successful as long as the chasm between software development teams and info security teams persists. Until these two departments agree on common goals, attacks targeting software vulnerabilities will continue to cause havoc.
Read More
Cybercriminal creating malicious software using laptop showing software supply chain attacks
Cyber SecurityNews

ENISA Predicts Fourfold Increase in Software Supply Chain Attacks in 2021, Warning That Strong Cyber Defenses Were No Longer Effective

August 16, 2021
ENISA says software supply chain attacks will quadruple in 2021, causing widespread impact as threat actors deploy more sophisticated techniques making strong cyber defenses ineffective.
Read More
Developer typing on laptop showing software supply chain attacks
Cyber SecurityNews

NIST and CISA Release Guidelines for Organizations and Vendors To Defend Against Software Supply Chain Attacks

May 10, 2021
Federal agencies NIST and CISA issued guidelines to defend organizations and vendors against acquiring or distributing programs compromised through software supply chain attacks.
Read More

Latest

Cyber attack on smartphone showing Android spyware for surveillance

Android Spyware Discovered in Kazakhstan in Wake of Protests Against National Government

Automobile production line showing OT devices vulnerabilities for industrial control systems

Warning for Industrial Control Systems: Research Discovers 56 “Insecure by Design” Vulnerabilities in Two Dozen OT Devices

User typing password on screen showing portable digital identity

Are Portable Digital Identities Swiftly Replacing Conventional Passwords?

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results