CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Supply Chain Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Supply Chain Security

Programmer working in desktop with code on monitor showing software bill of materials (SBOM)
Cyber SecurityInsights

Attackers Are Getting Smarter. Can Your SBOM Keep Up?

September 15, 2021
President Biden’s Executive Order includes a provision that would require software vendors selling to the federal government to maintain a Software Bill of Materials (SBOM). Unfortunately, it’s not that simple.
Read More
Technology background showing router vulnerability exposing supply chain risks
Cyber SecurityNews

12-Year-Old Router Vulnerability Discovered Affecting Millions of Devices Exposing Serious Supply Chain Risks

August 12, 2021
Hackers are exploiting a 12-year-old router vulnerability existing in the Arcadyan firmware, potentially affecting millions of devices on home and corporate networks, and exposing serious supply chain risks.
Read More
White House in Washington DC at night showing executive order to secure supply chain security and government contractors
Cyber SecurityInsights

Biden Administration Signals Dramatic Shift in Focus To Confront Cyber Concerns in Government Contracting

June 18, 2021
While the Executive Order primarily focuses on concrete steps the federal government must take to adopt cybersecurity best practices, there are several provisions that will also significantly impact government contractors, subcontractors and other private sector entities.
Read More
Dev team working on computers at night showing supply chain security
Cyber SecurityInsights

Recent Cyber Attacks Signal Alarm for Better Supply Chain Security

May 24, 2021
As malicious actors increasingly zero in on supply chain attacks, both third-party solutions providers and end users must make a more concentrated effort to shift to a ‘validation before implementation’ model.
Read More
Team members removing wooden blocks from a tower showing third party risk management
Cyber SecurityInsights

3 Ways To Improve Board-Level Focus on Third-Party Risk Management

March 9, 2021
Corporate boards are increasingly concentrating on cybersecurity issues. Here’s how to ensure they focus on third-party risk, too.
Read More
Hacker stealing data from digital tablet showing third party data breach of Dave banking app
Cyber SecurityNews

Third Party Data Breach Exposes Personal Information of 7.5+ Million Users of “Dave” Banking App

August 12, 2020
While there was no unauthorized access of user accounts for the third party breach, Dave’s users can expect phishing and identity fraud scams based on the information that was breached.
Read More
Hacker touching virtual technology screen showing the increasing concerns over supply chain security in COVID-19 outbreak
Cyber SecurityNews

Supply Chain Security on Thin Ice in The Age Of COVID-19

May 15, 2020
Supply chain security is becoming an increasing concern in COVID-19 outbreak as new opportunities are provided to cyber criminals seeking to exploit vulnerabilities.
Read More
Man clicking tick icon on virtual screen showing how the new vendor cyber security certification set to improve pentagon supply chain security
Cyber SecurityNews

New Vendor Cyber Security Certification Set to Improve Pentagon Supply Chain Security, but the Price May Sting Smaller Vendors

October 29, 2019
With tens of thousands of contractors serving the Defense Department, the new vendor cyber security certificate aims to improve supply chain security by assessing contractors before allowing them to bid.
Read More
Businessman stopping domino effect showing small vendors may not be the most vulnerable targets in supply chain security
Cyber SecurityNews

New Supply Chain Security Study Indicates Small Businesses May be Getting a Bum Rap

July 1, 2019
Supply chain security is a hot issue for enterprises with increasing third party data breaches. Recent (ISC)² study indicates these breaches are more likely the fault of a large enterprise partner than a small one.
Read More

Latest

Man holding mobile phone showing SMS phishing attack

SMS Phishing Attack Compromised Twilio Leaking Customer Data, Targeted Cloudflare

Digital yuan gold coin over yuan banknotes showing PBOC privacy protection for CBDC

Privacy Protection Coming for Digital Yuan? PBOC Promises “Respect” for Personal Information

World map on a technological background showing data privacy laws and cross-border data sharing

Navigating Evolving Data Privacy Laws and Cross-Border Data Sharing

Boy using phone in bed at night showing cyber safety and end-to-end encryption

UK Government Wrestles With Balance Between Child Cyber Safety and Legitimate End-to-End Encryption Purposes as Agencies Endorse Client-Side Scanning

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results