CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Supply Chain Security
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Supply Chain Security

Businessman stopping domino effect showing small vendors may not be the most vulnerable targets in supply chain security
Cyber SecurityNews

New Supply Chain Security Study Indicates Small Businesses May be Getting a Bum Rap

July 1, 2019
Supply chain security is a hot issue for enterprises with increasing third party data breaches. Recent (ISC)² study indicates these breaches are more likely the fault of a large enterprise partner than a small one.
Read More
Man clicking tick icon on virtual screen showing how the new vendor cyber security certification set to improve pentagon supply chain security
Cyber SecurityNews

New Vendor Cyber Security Certification Set to Improve Pentagon Supply Chain Security, but the Price May Sting Smaller Vendors

October 29, 2019
With tens of thousands of contractors serving the Defense Department, the new vendor cyber security certificate aims to improve supply chain security by assessing contractors before allowing them to bid.
Read More
Hacker touching virtual technology screen showing the increasing concerns over supply chain security in COVID-19 outbreak
Cyber SecurityNews

Supply Chain Security on Thin Ice in The Age Of COVID-19

May 15, 2020
Supply chain security is becoming an increasing concern in COVID-19 outbreak as new opportunities are provided to cyber criminals seeking to exploit vulnerabilities.
Read More
Hacker stealing data from digital tablet showing third party data breach of Dave banking app
Cyber SecurityNews

Third Party Data Breach Exposes Personal Information of 7.5+ Million Users of “Dave” Banking App

August 12, 2020
While there was no unauthorized access of user accounts for the third party breach, Dave’s users can expect phishing and identity fraud scams based on the information that was breached.
Read More
Team members removing wooden blocks from a tower showing third party risk management
Cyber SecurityInsights

3 Ways To Improve Board-Level Focus on Third-Party Risk Management

March 9, 2021
Corporate boards are increasingly concentrating on cybersecurity issues. Here’s how to ensure they focus on third-party risk, too.
Read More
Dev team working on computers at night showing supply chain security
Cyber SecurityInsights

Recent Cyber Attacks Signal Alarm for Better Supply Chain Security

May 24, 2021
As malicious actors increasingly zero in on supply chain attacks, both third-party solutions providers and end users must make a more concentrated effort to shift to a ‘validation before implementation’ model.
Read More
White House in Washington DC at night showing executive order to secure supply chain security and government contractors
Cyber SecurityInsights

Biden Administration Signals Dramatic Shift in Focus To Confront Cyber Concerns in Government Contracting

June 18, 2021
While the Executive Order primarily focuses on concrete steps the federal government must take to adopt cybersecurity best practices, there are several provisions that will also significantly impact government contractors, subcontractors and other private sector entities.
Read More
Technology background showing router vulnerability exposing supply chain risks
Cyber SecurityNews

12-Year-Old Router Vulnerability Discovered Affecting Millions of Devices Exposing Serious Supply Chain Risks

August 12, 2021
Hackers are exploiting a 12-year-old router vulnerability existing in the Arcadyan firmware, potentially affecting millions of devices on home and corporate networks, and exposing serious supply chain risks.
Read More
Programmer working in desktop with code on monitor showing software bill of materials (SBOM)
Cyber SecurityInsights

Attackers Are Getting Smarter. Can Your SBOM Keep Up?

September 15, 2021
President Biden’s Executive Order includes a provision that would require software vendors selling to the federal government to maintain a Software Bill of Materials (SBOM). Unfortunately, it’s not that simple.
Read More
Hacker in front of computer showing cyber attacks and supply chain security
Cyber SecurityInsights

How Preemptive Action Can Mitigate Supply Chain Cyberattacks

August 11, 2023
Each partner in the software supply chain must understand their role in maintaining the security of the process. Transitioning from a blame-game to a proactive stance allows organizations to implement a well-defined, adaptable, and optimized strategy that helps mitigate risks and protect the supply chain.
Read More

Latest

Criminal talking on the phone showing vishing attacks

Google Warns Salesforce Customers of Large-Scale Vishing Attacks

Google logo showing certificate authorities

Google to Distrust Two Certificate Authorities Over Compliance Issues

Hands typing on keyboard showing security incident

Victoria’s Secret Security Incident Shuts Down Lingerie Giant’s Systems

Cars waiting on the road showing vehicle security

Balancing Safety and Security in Software-Defined Vehicles

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results