Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign

Supply chain compromises are an increasing threat that impacts a range of sectors, with threat actors leveraging access to support several motivations including financial gain (such as with the Kaseya ransomware attack) and espionage. Throughout 2020, an operation attributed to the Foreign Intelligence Service of the Russian Federation (SVR) by the U.S.

Securing the Digital Supply Chain - Why are Investors interested in the digital supply chain

In this session for the Securing the Digital Supply Chain we talk to two very well known investors from Silicon Valley - Mahendra Ramsinghani (Secure Octane) and Cherian Mathew (Firebolt VC). We learn what drives the investment thought process for these two successful VCs and also hear what their perspectives are on cybersecurity, areas of interest, how to think about the market. Especially interesting are the thoughts on "Who gets affected" from a Digital Supply Chain perspective.

The Supply Chain Needs Better Cybersecurity and Risk Management

The supply chain is under a historic amount of pressure, but the strain on its cybersecurity and risk management may be in even worse condition. As 2021 draws to a close, the global supply chain is in a state comparable to rush-hour traffic in bad weather. Everything seems to be backed up whether due to supply and demand issues, wait times at shipping ports, or any number of other delays.

Riscosity - Securing The Digital Supply Chain - Thought Leaders - Ep. 1

In this episode of Securing the Digital Supply Chain Anirban Banerjee , CEO and co-founder of Riscosity talks to Atif Yusuf and Ravi Gunturi, two well known security leaders in the San Francisco Bay Area. Note - all opinions expressed here belong to the individuals only.

FTC highlights the importance of securing Log4j and software supply chain

Earlier this week, the FTC issued a warning to companies regarding the Log4j vulnerability. Given the rampant exploitation of the recently discovered vulnerabilities in this ubiquitous open source logging package, it’s encouraging to see the agency take this rare step, beginning to form a firm stance on software supply chain security. Although this increased scrutiny from the FTC may at first seem daunting, violations can be remediated with the right practices.

Subscription Payment Models Adopted by Car Manufacturers as a Precursor to Supply-Chain Attacks

Subscriptions-based services are a reality we all are getting used to; most people no longer buy physical media for example, opting to use streaming services for movies and music. This has numerous advantages like letting us explore new artists and genres without additional costs and commitment. Yet, while best known for its implementation in the digital world, subscription payment models are slowly but surely being adopted by more and more industries.

Q3 2021 Threat Landscape Ransomware in the Supply Chain

In a pattern of continued growth across the third quarter of 2021, ransomware remains the dominant threat type, more than doubling since 2021 Q1, fuelled by an exponential increase in the initial access broker marketplace. Incidents of unauthorized access and the risk of insider threats also increased, but to a far lesser extent, accounting for roughly 20% of incidents in the same period.

SecurityScorecard Announces Plan to Train & Certify 25,000 Supply Chain Risk Professionals

Cybersecurity threats are on the rise. Over the past year, we’ve observed a 148% increase in ransomware attacks and an 85% increase in phishing attacks targeting remote users. Worse still, these attacks are growing increasingly sophisticated, with threat actors using eight or more vectors in the same attack, often deploying multiple vectors within minutes of one another.