Topic: supply chain risk
-
Cybersecurity's Triple Threat: AI, Quantum, Geopolitics
Geopolitical tensions and emerging threats are elevating cybersecurity to a top strategic priority, prompting organizations to reassess infrastructure and partnerships. Despite increased budgets and AI investments, low confidence in resilience persists due to legacy systems, reactive spending, an...
Read More » -
Go Beyond Checklists: Build a Mature Automotive Cybersecurity Program
A mature automotive cybersecurity program requires a foundation in established frameworks like ISO, but must go beyond compliance by developing a tailored risk management strategy that addresses unique threats and deploys proactive controls across the enterprise. Comprehensive threat visibility, ...
Read More » -
BRICKSTORM Returns: Why Your Enterprise Must Boost Cyber Defenses
The BRICKSTORM espionage campaign targets legal, technology, SaaS, and BPO firms to steal intellectual property and sensitive data, requiring immediate cybersecurity reassessment. Its stealthy infiltration of overlooked infrastructure like network appliances and virtualization platforms allows at...
Read More » -
Global Data Breach Risk Soars from Indian Suppliers
Over half of key Indian suppliers experienced a third-party breach in the last year, posing risks to global businesses in sectors like semiconductors and pharmaceuticals. Outsourced IT and managed service providers were responsible for nearly two-thirds of breaches, with network security flaws an...
Read More » -
A New Chapter in Cyber Resilience: The Digital As Usual Roadshow in Sydney and Brisbane
The Digital As Usual: Cybersecurity roadshow in Sydney and Brisbane aimed to shift the conversation about digital threats from a technical issue to a strategic, whole-of-business imperative. The event focused on three key areas: human risk, quantifying cyber risk, and supply chain security.
Read More » -
Tech Manufacturer Data I/O Struck by Ransomware Attack
Data I/O, a U.S. technology manufacturer, experienced a ransomware attack on August 16, disrupting critical operations including communications, shipping, and production. The company has partially restored some functions but has not provided a timeline for full recovery, and the attack's financia...
Read More »