According to a report by Cyberscoop, open-source Linux users narrowly avoided a catastrophe. A Microsoft developer found one of the most sophisticated…
cybersecurity
-
-
A recent report from JFrog, the “Software Supply Chain State of the Union 2024,” highlights the growing challenges and risks organizations face in…
-
Ten years after its national cybersecurity framework rolled out, the National Institute of Standards and Technology (NIST) released version 2.0, emphasizing governance and…
-
Both Germany’s and South Korea’s intelligence agencies are warning of an ongoing cyber-espionage operation targeting the global defense sector by the North…
-
The Identity Theft Resource Center just released its 2023 Annual Data Breach Report, showing a 72% rise in compromises over the previous…
-
BusinessLogisticsMarket OutlookNewsOperationsProcurementSupply Chain
Do You Know Which Sector Experiences the Most Attacks in the Cloud?
According to a survey of 1,610 IT and security professionals globally, phishing, user account compromise and data theft were the most common…
-
BusinessMarket OutlookNewsOperationsSupply ChainTechnology
Cybersecurity and Supply-Chain Risks are at Odds
Key findings of a Rand Corporation report include: Cyber-related risks could be worse and different from other types of supply-chain risks Preventive…
-
BusinessLogisticsMarket OutlookNewsOperationsProcurementSupply Chain
Risk Outlook—Global Trade in 2024 to be a Rocky Road
We’re moving from the post-pandemic calm to another tumultuous year for global trade. According to Everstream Analytics’ just-released annual risk report, several…
-
The UK and Republic of Korea (ROK) national cybersecurity organizations issued a joint warning of an increased volume and sophistication of North…
-
This year, The U.S. Congress is looking into reauthorizing Section 702 of the Foreign Intelligence Surveillance Act. The Act permits the Government…
-
BusinessNewsOperationsSupply ChainTechnology
Software Supply Chain Security Risks are Here—What Now?
Purdue University researchers are taking on the surge in supply chain attacks, specifically the ones involving third-party software suppliers and vendors connected to…