Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Supply Chain

Supply Chain Attack Fundamentals

Overview: Picture this: Your website included a 3rdparty component (such as a WordPress plug-in), and hackers used that as a backdoor to infiltrate your systems, which were secure on their own. This is a supply chain attack. Pollyfillio attack is a recent example of this where 100,000 websites were impacted last month. In this webinar, Vivekanand Gopalan (VP of Products - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) discuss strategy and tactics to protect your applications from supply chain attacks.

Securing the Software Supply Chain in the AI/ML Era

Uncover Critical Gaps in Software Supply Chain Security A recent survey of over 300 global IT executives found that while 23% of organizations experienced software supply chain (SSC) breaches, only 30% prioritize SSC security. Our APAC tech leaders dive into these insights and offer practical solutions to enhance your security posture. Discover the latest trends and effective measures to protect your software supply chain.

Reimagining Supply Chain Cybersecurity

From ransomware attacks to data breaches, the threats lurking within supply chains are more pervasive than you might realize. Many security teams aren’t aware of the various supply chain cyber risks lurking within their network, most of which are difficult to detect, manage, and mitigate. Let’s explore how to achieve a more secure and resilient supply chain.

2024 Cyber Resilience Research: Aligning Retail Cybersecurity with Business Priorities

New data illuminates how retail leaders can prioritize resilience. In today’s retail environment, businesses embrace dynamic computing and other technological innovations to enhance operations and customer experiences. However, as these advancements accelerate, so does the risk of cyber threats.

Building a Resilient Supply Chain in the Face of Cyber Threats

Supply chain resilience has never been more critical. Recent cyber outages have underscored a harsh reality—supply chains are vulnerable, and disruptions can have far-reaching impacts. But what does it mean to be supply chain resilient, especially in the context of cyber threats? In this post, we will explore lessons learned from recent cyber outages, offering actionable insights for enhancing supply chain resilience.

Three trends shaping software supply chain security today

Building software continues to look like an assembly line, with developers pulling resources from across the web to create applications. Although third-party resources have played an essential role in developing software for many years, the way that development teams use these external components looks different today.

Out with the Old - Keeping Your Software Secure by Managing Dependencies

During 2023, the U.S. witnessed a record high in supply chain cyber-attacks, affecting 2,769 organizations. This figure represents the largest number recorded since 2017, marking an approximate 58% annual increase in impacted entities. If there ever was a doubt, now it’s crystal clear that YOUR SOFTWARE SUPPLY CHAIN IS A TARGET. Developers, DevOps and Security teams must prioritize processes that enhance security for all phases of the software supply chain.

Supply Chain Visibility: The Key to NIS2 Coordinated Risk Assessments

The path to NIS2 compliance is less about ticking boxes and more about fostering a resilient, proactive cybersecurity culture across the organisation and its extended network. While the challenges pertaining to third-party and supply chain risk management are significant, they are not insurmountable—especially if we break them down. Today we will focus on understanding a very specific NIS2 requirement: Coordinated Risk Assessments.

Continuous Accountability: Leveraging Contracts to Secure your Supply Chain

A critical problem for security and legal professionals who manage supply chain risk is that cybersecurity risks are dynamic and always shifting. You have done your due diligence and selected a vendor with strong cybersecurity controls – but how can you guarantee that your vendor maintains this type of security hygiene and doesn’t become a target and a “weak link” in your supply chain?