Protecting the U.S. from Software Supply Chain Attacks (Part 1)
In recent articles, we’ve written extensively about software supply chain attacks, including: ... Read More
No One-Size Fits All Framework
Data Security Podcast In a recent interview with Cybercrime Magazine's Editor-in-Chief, Steve Morgan, Robert E. Johnson III, Cimcor CEO/President, discusses the best practices and frameworks. ... Read More
Software Supply Chain Attacks: How Did We Get Here?
Over the last decade, software supply chain attacks have become increasingly more sophisticated—and more damaging ... Read More
Podcast: Look at Integrity Holistically
In a recent interview with Steve Morgan, Editor in Chief of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, brings an insight on the importance of looking at integrity holistically, and how file integrity monitoring only scratches the surface of securely maintaining integrity. Cybercrime Magazine · Data Security. Look at ... Read More
An Onslaught of Threats in Cybersecurity
Data Security Podcast In a recent interview with Steve Morgan, Editor in Chief of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, discusses the problem of the onslaught of threats that the world of cybersecurity is facing today and how system integrity assurance can help. ... Read More
Is the U.S. Learning From Software Supply Chain Attacks?
We’ve written a lot about the dangers of supply chain attacks in recent articles ... Read More
What are the Consequences of a Software Supply Chain Attack?
Software supply chain attacks can be devastating ... Read More
Have Regulations Made the US Safer From Software Supply Chain Attacks?
There’s nothing new about supply chain attacks—or regulations designed to protect against them ... Read More
What Are Software Supply Chain Attacks?
With a successful supply chain attack against just one organization—often an unremarkable technology vendor—a criminal group can gain privileged access to the network of one (or all) of its customers ... Read More
FTC Issues Log4j Remediation Warning
In a recent post, the Federal Trade Commission warns of potential legal consequences for organizations who do not "mitigate known software vulnerabilities". Due to the fallout of the recent Log4j exploits, it was noted that the vulnerability poses a severe risk to millions of consumer products to enterprise software and ... Read More