Tag: Supply Chains
-
Supply Chain Cybersecurity – the importance of everyone
Image I’m always surprised – and a little disappointed – at how far we have to go before supply chain cybersecurity gets the …
-
XZ Utils Backdoor: Supply Chain Vulnerability (CVE-2024-3094)
XZ Utils is a set of open-source compression utilities for compressing and decompressing files using the LZMA compression algorithm, known …
-
Protecting Data in The Final Stretch of The Supply Chain
Building a Secure Last Mile for Global Commerce By Dan O’Toole, Chairman & CEO, Arrive Navigating the Last Mile: Securing the Final …
-
Supply Chain Threats and Regulations – BTS #25
Paul and Allan will talk a little bit about Allan’s background and current work at Eclypsium. Next, we’ll cover some of the recent news and …
-
Managing Supply Chain Risk – Saša Zdjelar – BTS #24
Saša Zdjelar joins us on this episode to dive into how organizations can manage supply chain risk, including the current challenges we …
-
The Unknown Risks of The Software Supply Chain: A Deep-Dive
In a world where more & more organizations are adopting open-source components as foundational blocks in their application’s …
-
SBOMs and Supply Chains – Allan Friedman – BTS #22
We sit down with the father of the SBOM, Allan Friedman, to discuss examples of where we really need SBOMs, how to operationalize SBOMs, …
-
2023: The Year Open Source Security Supply Chain Grew Up
Open source security is now vital not only to developers but to governments and top corporations as well. Open source security has always …
-
Network Device Supply Chains and Lateral Movement – Joe Hall – BTS #20
In this episode, we have the privilege of sitting down with renowned security expert Joe Hall to discuss three critical facets of modern …
-
Supply Chain – PSW #811
AI generated description fun: “As the glasses are filled and the mood lightens, our veteran guests, each with a legendary tale or two …
-
Guidehouse-AFERM Survey: Federal Agencies See Cybersecurity, Privacy as Top Risk Management Areas
A survey by Guidehouse and the Association for Federal Enterprise Risk Management has found that cybersecurity and privacy continue to top …
-
North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques …
●●●