Nick Martindale explores the risks to organisations associated with supply chain cyberattacks and what you should do about it ...
Software bill of materials (SBOMs) play an important role in product and software security, but many misconceptions have ...
2014 was a year of many firsts. Rosetta's Philae lander made the first successful landing on a moving comet, Janet Yellen was ...
Scribe also streamlines customer tracking and vulnerability notifications. By cataloging agency-specific software usage and ...
As cybercrime continues to evolve in scope, the threat posed by vulnerabilities within the IT supply chain cannot be ...
Supply chain cybersecurity must be solved or business leaders will face dire consequences—if they haven’t already.
Call for Presentations (CFP) is open for the 2025 Supply Chain Security & Third-Party Risk Summit, taking place virtually on ...
Fans of The Big Lebowski know the movie’s narrator introduces the protagonist as "the man for this time and place." ...
An increase in compliance activities such as the creation of software bills of materials (SBOMs), performing software ...
AI Model Discovery roots out models in use, assesses their safety, and enforces use policies — but only if they are from ...
Managed security service providers bring the expertise and resources to monitor, assess and respond to risks posed by third-party vendors, says Nemanja Krstić, operations manager – Managed Security ...
A new US Commerce Department rule banning Chinese and Russian hardware and software in internet-connected vehicles takes ...