CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Supply Chain Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Supply Chain Security

Programmer working in desktop with code on monitor showing software bill of materials (SBOM)
Cyber SecurityInsights

Attackers Are Getting Smarter. Can Your SBOM Keep Up?

September 15, 2021
President Biden’s Executive Order includes a provision that would require software vendors selling to the federal government to maintain a Software Bill of Materials (SBOM). Unfortunately, it’s not that simple.
Read More
Technology background showing router vulnerability exposing supply chain risks
Cyber SecurityNews

12-Year-Old Router Vulnerability Discovered Affecting Millions of Devices Exposing Serious Supply Chain Risks

August 12, 2021
Hackers are exploiting a 12-year-old router vulnerability existing in the Arcadyan firmware, potentially affecting millions of devices on home and corporate networks, and exposing serious supply chain risks.
Read More
White House in Washington DC at night showing executive order to secure supply chain security and government contractors
Cyber SecurityInsights

Biden Administration Signals Dramatic Shift in Focus To Confront Cyber Concerns in Government Contracting

June 18, 2021
While the Executive Order primarily focuses on concrete steps the federal government must take to adopt cybersecurity best practices, there are several provisions that will also significantly impact government contractors, subcontractors and other private sector entities.
Read More
Dev team working on computers at night showing supply chain security
Cyber SecurityInsights

Recent Cyber Attacks Signal Alarm for Better Supply Chain Security

May 24, 2021
As malicious actors increasingly zero in on supply chain attacks, both third-party solutions providers and end users must make a more concentrated effort to shift to a ‘validation before implementation’ model.
Read More
Team members removing wooden blocks from a tower showing third party risk management
Cyber SecurityInsights

3 Ways To Improve Board-Level Focus on Third-Party Risk Management

March 9, 2021
Corporate boards are increasingly concentrating on cybersecurity issues. Here’s how to ensure they focus on third-party risk, too.
Read More
Hacker stealing data from digital tablet showing third party data breach of Dave banking app
Cyber SecurityNews

Third Party Data Breach Exposes Personal Information of 7.5+ Million Users of “Dave” Banking App

August 12, 2020
While there was no unauthorized access of user accounts for the third party breach, Dave’s users can expect phishing and identity fraud scams based on the information that was breached.
Read More
Hacker touching virtual technology screen showing the increasing concerns over supply chain security in COVID-19 outbreak
Cyber SecurityNews

Supply Chain Security on Thin Ice in The Age Of COVID-19

May 15, 2020
Supply chain security is becoming an increasing concern in COVID-19 outbreak as new opportunities are provided to cyber criminals seeking to exploit vulnerabilities.
Read More
Man clicking tick icon on virtual screen showing how the new vendor cyber security certification set to improve pentagon supply chain security
Cyber SecurityNews

New Vendor Cyber Security Certification Set to Improve Pentagon Supply Chain Security, but the Price May Sting Smaller Vendors

October 29, 2019
With tens of thousands of contractors serving the Defense Department, the new vendor cyber security certificate aims to improve supply chain security by assessing contractors before allowing them to bid.
Read More
Businessman stopping domino effect showing small vendors may not be the most vulnerable targets in supply chain security
Cyber SecurityNews

New Supply Chain Security Study Indicates Small Businesses May be Getting a Bum Rap

July 1, 2019
Supply chain security is a hot issue for enterprises with increasing third party data breaches. Recent (ISC)² study indicates these breaches are more likely the fault of a large enterprise partner than a small one.
Read More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results