Lazarus Group Used Supply Chain Attack to Target South Korean Users with Malware

Lazarus Group Used Supply Chain Attack to Target South Korean Users with Malware

The Lazarus group leveraged a supply chain attack to target users located in South Korea with custom malware. On November 16, ESET disclosed that the Lazarus group conducted its supply chain attack ...

Understanding Cybersecurity Supply Chain Risk Management (C-SCRM)

Cybersecurity Supply Chain Risk Management (C-SCRM) deals with more than protecting an organization from cyber-attacks on third parties. It also addresses third parties to those third parties (known as “fourth parties”). Further ...

SCM in Practice: How to Strengthen Your Organization’s Security Processes

Security configuration management (SCM) involves maintaining a secure baseline configuration for an organization’s systems and monitoring those assets for deviations from that baseline. This fundamental control pairs well with other elements of ...

Supply Chain Risk Management – What You Need to Know to Build a Successful SCRM Program

There is a story from years ago about a warehouse network of computers that was separated from the main network. Those machines were running older OSes. But since they weren’t connected to ...
Managing Cybersecurity Risks Up and Down the Supply Chain, Part 2

Managing Cybersecurity Risks Up and Down the Supply Chain, Part 2

This is part two of a two-part series about third-party risks and cybersecurity frameworks. If you haven’t already read it, check out part one here ...
Managing Cybersecurity Frameworks to Reduce Third-Party Risk | Apptega

Managing Cybersecurity Frameworks to Reduce Third-Party Risk | Apptega

This is part two of a two-part series about third-party risks and cybersecurity frameworks. If you haven’t already read it, check out part one here ...
pandemic

After the Pandemic: What the IT World May Look Like

For the last few months, most IT departments have been struggling just to get through various pandemic-related fire drills such as overnight work-from-home infrastructures that need to be put into place and ...
Security Boulevard
Managing Cybersecurity Risks Up & Down the Supply Chain

Managing Cybersecurity Risks Up & Down the Supply Chain

This is part one of a two-part blog series about third-party risks and cybersecurity frameworks ...
Managing Cybersecurity Risks Up & Down the Supply Chain | Apptega

Managing Cybersecurity Risks Up & Down the Supply Chain | Apptega

    This is part one of a two-part blog series about third-party risks and cybersecurity frameworks ...
How the Cyber Grinch Stole Christmas: Managing Retailer Supply Chain Cyber Risk

How the Cyber Grinch Stole Christmas: Managing Retailer Supply Chain Cyber Risk

Cyber threats are always a prominent risk to businesses, especially those operating with high quantities of customer information in the retail space, with over 50% of global retailers were breached last year ...