Managing Cybersecurity Risks Up and Down the Supply Chain, Part 2

Managing Cybersecurity Risks Up and Down the Supply Chain, Part 2

This is part two of a two-part series about third-party risks and cybersecurity frameworks. If you haven’t already read it, check out part one here ...
pandemic

After the Pandemic: What the IT World May Look Like

For the last few months, most IT departments have been struggling just to get through various pandemic-related fire drills such as overnight work-from-home infrastructures that need to be put into place and ...
Security Boulevard
Managing Cybersecurity Risks Up & Down the Supply Chain

Managing Cybersecurity Risks Up & Down the Supply Chain

This is part one of a two-part blog series about third-party risks and cybersecurity frameworks ...
How the Cyber Grinch Stole Christmas: Managing Retailer Supply Chain Cyber Risk

How the Cyber Grinch Stole Christmas: Managing Retailer Supply Chain Cyber Risk

Cyber threats are always a prominent risk to businesses, especially those operating with high quantities of customer information in the retail space, with over 50% of global retailers were breached last year ...

Hackers Come for Oil and Gas

Last month’s ransomware attack against the Mexican oil firm Pemex showed how the oil industry’s embrace of digital technology has made them a high-value target for hackers. The attack—a strain of ransomware ...

Mitigating the Threat of Hackers to Your Supply Chain

The rate of digital disruption has recently skyrocketed across every industry, helping accelerate global expansion and automating mundane, menial tasks. Coupled with this is the fact that as businesses grow globally, we ...

Ransomware, Phishing, and Supply Chain the Most Significant Threats to UK Businesses

Trend analysis is an important topic within threat intelligence. It lets us forecast where things are headed; whether they’re getting better, worse or different; and where we should be focusing our precious ...

Clean IT Up: Cyber Hygiene Controls Tips

October is national cybersecurity awareness month, and with the recent hacks at Door Dash, the discovery of a large-scale iOS hacking campaign, and a database containing 419 million phone numbers associated with ...
supply chain

The Journey of Securing a Long-Tail Supply Chain

Supply chains often are long and complex, and as organizations rely more and more on data to drive their businesses, digital supply chains continue to grow. And as the supply chains continue ...
Security Boulevard
Supply Chain Vulnerabilities from Legacy Approaches

Supply Chain Vulnerabilities from Legacy Approaches

| | DoD, PreVeil, supply chain
In a recent customer discussion, a CISO shared his concern with me regarding his company’s data. He worried that confidential data that had been shared with their suppliers would be leaked. He ...