Supply Chain Security

Connected operational environments have led to rising cybersecurity risks throughout the supply chain, prompting an increased need to focus on and develop appropriate response strategies, policies, processes, and procedures. Enterprises must identify, assess, select, and implement Risk Management processes while mitigating appropriate controls. These measures would help manage cybersecurity risks throughout the supply chain.

Identifying cybersecurity risks throughout the supply chain is complicated by the information asymmetry that exists between organizations, their suppliers, and service providers. As a result, organizations must build their cybersecurity supply chain risk considerations and requirements into their acquisition processes and highlight the importance of risk monitoring. In addition, as cybersecurity risks can crop up at any point in the lifecycle or within any link in the supply chain, organizations must also consider “potential” vulnerabilities.

Cyble detects critical vulnerabilities in CyberPower PowerPanel Business Software used in critical infrastructure
Cyble detects critical vulnerabilities in CyberPower PowerPanel Business Software used in critical infrastructure
Forescout analyzes 90,000 unknown vulnerabilities, risk blind spots that live in the wild
Forescout analyzes 90,000 unknown vulnerabilities, risk blind spots that live in the wild
Growing threat of malware and ransomware attacks continues to put industrial environments at risk
Growing threat of malware and ransomware attacks continues to put industrial environments at risk
CISA and FBI issue secure by design alert to urge manufacturers to remove directory traversal vulnerabilities
CISA and FBI issue secure by design alert to urge manufacturers to remove directory traversal vulnerabilities
Global cybersecurity agencies issue alert on threat to OT systems from pro-Russia hacktivist activity
Global cybersecurity agencies issue alert on threat to OT systems from pro-Russia hacktivist activity

Industrial Cyber Experts

Jonathon Gordon
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Organizations across the industrial cybersecurity space are constantly dealing with challenges including software breaches, hardware vulnerabilities, supply chain... Read full story
Sinclair Koelemij
Vulnerability handling according to the European Cyber Resilience Act (CRA)
So far, cybersecurity regulations in Europe have been primarily driven by the NIS2 regulations. The NIS2 regulations are... Read full story
Kevin Kumpf
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Incorporating a zero-trust framework into OT (operational technology) and ICS (industrial control system) environments becomes imperative in addressing... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story