CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Software Supply Chain
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Software Supply Chain

Software developer working on laptop showing protestware and software supply chain
Cyber SecurityInsights

Organizations, Beware: Protect Against Protestware

May 6, 2022
The term protestware recently made global news when organizations in Russia and Belarus were attacked by malicious code that wiped their computers’ files. This malware was distributed through the popular open source JavaScript library, node-ipc, and was introduced by its maintainer in retaliation for Russia's invasion of Ukraine.
Read More
Dark background of silhouettes of computer motherboard showing security vulnerability affecting software supply chain
Cyber SecurityNews

Blackberry Buried Security Vulnerability in OS Until Forced To Disclose by Feds; Was Discovered in April

August 23, 2021
Security vulnerability that impacts an older form of a BlackBerry industrial systems OS, still in use in both industrial settings and hospital equipment, was discovered by Microsoft researchers in April of this year. Many are only now learning about it.
Read More
Hands typing on laptop in the dark showing code signing to secure software supply chain
Cyber SecurityInsights

Threats in the Software Supply Chain: Why Code Signing Best Practices Are Vital To Hardening Security

July 26, 2021
Code signing is like a virtual mechanic, ensuring trust across the software supply chain by validating the identities of source code and verifying that it hasn’t been tampered with. Code signing isn’t new, but it has changed.
Read More

Latest

Chick-fil-A restaurant showing privacy lawsuit over data collection

Chick-fil-A Hit With Privacy Lawsuit Over Data Collection Embedded in Viral Video Marketing Campaign

Man pointing at HR icons showing AI use in HR processes

AI in HR – How To Make Use of the New Hype in a Compliant Manner

Privacy’s Shifting Left: Are You Ready To Move?

Airline passengers in an international airport showing no fly list in data leak

Wanted Hacker Accessed Federal No Fly List on an Unsecured Airline’s Server

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results