Protecting the U.S. from Software Supply Chain Attacks (Part 1)

Protecting the U.S. from Software Supply Chain Attacks (Part 1)

In recent articles, we’ve written extensively about software supply chain attacks, including: ... Read More
Podcast: No One-Size Fits All Framework

No One-Size Fits All Framework

|
Data Security Podcast In a recent interview with Cybercrime Magazine's Editor-in-Chief, Steve Morgan, Robert E. Johnson III, Cimcor CEO/President, discusses the best practices and frameworks.  ... Read More
Software Supply Chain Attacks: How Did We Get Here?

Software Supply Chain Attacks: How Did We Get Here?

Over the last decade, software supply chain attacks have become increasingly more sophisticated—and more damaging ... Read More
Look at Integrity Holistically

Podcast: Look at Integrity Holistically

In a recent interview with Steve Morgan, Editor in Chief of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, brings an insight on the importance of looking at integrity holistically, and how file integrity monitoring only scratches the surface of securely maintaining integrity. Cybercrime Magazine · Data Security. Look at ... Read More
Podcast: An Onslaught of Threats

An Onslaught of Threats in Cybersecurity

Data Security Podcast In a recent interview with Steve Morgan, Editor in Chief of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, discusses the problem of the onslaught of threats that the world of cybersecurity is facing today and how system integrity assurance can help.  ... Read More
Is the U.S. Learning From Software Supply Chain Attacks?

Is the U.S. Learning From Software Supply Chain Attacks?

We’ve written a lot about the dangers of supply chain attacks in recent articles ... Read More

Have Regulations Made the US Safer From Software Supply Chain Attacks?

There’s nothing new about supply chain attacks—or regulations designed to protect against them ... Read More

What Are Software Supply Chain Attacks?

With a successful supply chain attack against just one organization—often an unremarkable technology vendor—a criminal group can gain privileged access to the network of one (or all) of its customers ... Read More

FTC Issues Log4j Remediation Warning

In a recent post, the Federal Trade Commission warns of potential legal consequences for organizations who do not "mitigate known software vulnerabilities".  Due to the fallout of the recent Log4j exploits, it was noted that the vulnerability poses a severe risk to millions of consumer products to enterprise software and ... Read More