supply chain

Cybersecurity is Everyone’s Responsibility
In our digital age, cybersecurity is a shared mission. Each of us has a part to play. By staying informed, adopting best practices and remaining alert, we can all contribute to a ...
Security Boulevard

The Global Effort to Maintain Supply Chain Security | Part Two
Various Cybersecurity Experts, CISO Global A well-run kitchen requires a fully stocked pantry and a clear understanding of what’s on hand. In cybersecurity, your pantry is your asset inventory—every server, every piece ...

Air-Gapped Systems Breached: A Deep Dive into the Attack and Prevention
Joe Ariganello | | Blog, cyber attacks, Cyber Threats, Data breach, Malware, nation-state attacks, Nation-State Bad Actors, National Cybersecurity Strategy, supply chain
Once considered impregnable bastions of security, air-gapped systems have been shown to be vulnerable to sophisticated attacks. These systems, physically isolated from networks, were believed to be immune to remote hacking ...

BTS #38 – The Role of SBOMs in Modern Cybersecurity – Patrick Garrity
In this episode of Below the Surface, host Paul Ascadorian and guest Patrick Garrity discuss the complexities of vulnerability tracking and prioritization. They explore various sources of vulnerability data, the significance of ...

A Treacherous Dinner Party: The Global Effort to Maintain Supply Chain Security
hmeyers | | Blog Posts, Cybersecurity, Extended Detection and Response, security, supply chain, TechRadar, XDR
Various Security Experts at CISO Global …In the world of supply chain security, vigilance is your best friend. Stay informed, stay alert, and always prioritize security in your decisions. After all, in ...
Israel’s Pager Attacks and Supply Chain Vulnerabilities
Israel’s brazen attacks on Hezbollah last week, in which hundreds of pagers and two-way radios exploded and killed at least 37 people, graphically illustrated a threat that cybersecurity experts have been warning ...

AI Integration, Budget Pressures Challenge CISOs
Chief information security officers (CISOs) are struggling to manage cybersecurity effectively due to a lack of strategic support from other C-suite executives, according to a LevelBlue survey of 1,050 C-suite and senior ...
Security Boulevard
Compromising the Secure Boot Process
Bruce Schneier | | cryptography, encryption, keys, passwords, supply chain, Uncategorized, Vulnerabilities
This isn’t good: On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by Acer, Dell, Gigabyte, Intel, and Supermicro. The ...

Supply Chain Cyberattacks are on the Rise – Here’s How U.S. Businesses can Fortify Their Defenses
The management of vendor and third-party risks is emerging as the number one challenge among U.S. information security professionals ...
Security Boulevard

Data Breaches Impact Growing Number of Victims, ITRC Finds
The number of data breach victims in the first half (H1) of 2024 has surged to 1,078,989,742, marking a 490% increase compared to the same period in 2023, which saw 182,645,409 victims ...
Security Boulevard