CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Software Supply Chain
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Software Supply Chain

Software developer working on laptop showing protestware and software supply chain
Cyber SecurityInsights

Organizations, Beware: Protect Against Protestware

May 6, 2022
The term protestware recently made global news when organizations in Russia and Belarus were attacked by malicious code that wiped their computers’ files. This malware was distributed through the popular open source JavaScript library, node-ipc, and was introduced by its maintainer in retaliation for Russia's invasion of Ukraine.
Read More
Dark background of silhouettes of computer motherboard showing security vulnerability affecting software supply chain
Cyber SecurityNews

Blackberry Buried Security Vulnerability in OS Until Forced To Disclose by Feds; Was Discovered in April

August 23, 2021
Security vulnerability that impacts an older form of a BlackBerry industrial systems OS, still in use in both industrial settings and hospital equipment, was discovered by Microsoft researchers in April of this year. Many are only now learning about it.
Read More
Hands typing on laptop in the dark showing code signing to secure software supply chain
Cyber SecurityInsights

Threats in the Software Supply Chain: Why Code Signing Best Practices Are Vital To Hardening Security

July 26, 2021
Code signing is like a virtual mechanic, ensuring trust across the software supply chain by validating the identities of source code and verifying that it hasn’t been tampered with. Code signing isn’t new, but it has changed.
Read More

Latest

Aerial view of factory showing hackers cyber attack on critical infrastructure

CISA Warns About Unsophisticated Hackers Compromising U.S. Critical Infrastructure

Access granted screen on monitor showing data breach

Education Giant Pearson Confirms Customer Data Breach After Cyber Attack

Mechanical bug on keyboard showing vulnerability database

EU Launches Government-Backed Vulnerability Database as CVE Alternative

Stack of golden Monero coins showing ban on privacy coins and anonymous crypto accounts

EU Looks to Ban Privacy Coins and Anonymous Crypto Accounts by 2027

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results