Blog Posts Tagged with "Supply Chain"

D36d0936f0c839be7bf2b20d59eaa76d

New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board

January 04, 2019 Added by:Steve Durbin

Four security topics businesses should focus on in 2019.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Microsoft Disrupts Nitol Botnet: Malware Hidden in Supply Chain

September 16, 2012 Added by:Pierluigi Paganini

Cybercriminals are exploiting a new way to spread malware by preloading malicious code inside counterfeit software deployed in computers that are offered for sale. To give you an idea of the phenomenon, 20% of the PCs researchers bought from an unsecure supply chain were infected with malware...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Huawei and Cyber Espionage: A Question of Trust But Verify

August 06, 2012 Added by:Infosec Island Admin

We, the US, have unfortunately set ourselves up in a “pay less” mindset that has ha the military buying cheap hardware for missile systems that in the end, failed to launch. Do you want to have the same happen to your router or other hardware that your company relies on? Never mind the whole espionage thing...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Center for Internet Security Unveils Trusted Purchasing Alliance

June 28, 2012 Added by:Headlines

“The mission of the Alliance is to maximize buying power to improve the cyber security posture of governments and not-for-profits... to help organizations in the public sector procure solutions to address cyber security... [a] trusted environment public sector organizations can turn to for expert guidance..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Chinese-Made US Military Chip: Backdoor or Debugging Function?

May 29, 2012 Added by:Pierluigi Paganini

News has been circulating on internet about a microchip used by the US military and manufactured in China that contains a secret "backdoor" that makes possible remote control of devices utilizing it. Security expert Robert Graham has declared that the bug is merely for debugging operations...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Security: Back to the "Made in the USA" Tradition

May 23, 2012 Added by:Jayson Wylie

The US government’s Department of Defense had, and may still have, issues with counterfeit components being procured and used in military weapons, vehicles and equipment. It’s a national security issue when the supply chains are compromised by weaknesses and scams...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ZTE Confirms Backdoor Vulnerability in Android Devices

May 22, 2012 Added by:Headlines

"ZTE's Score M ships with an application featuring a hardcoded password that gives the user... administrator-level access. Running the program with the password spawns a root shell prompt on the Linux-powered mobes, allowing the phone to be completely taken over..."

Comments  (0)

296634767383f056e82787fcb3b94864

USCC Report on China Misses the Boat on Cyber Espionage

March 13, 2012 Added by:Jeffrey Carr

The report did a good job exploring part of the Supply Chain problem with with chip development. It didn't cover the more common problem of U.S. companies who out-source development work to Chinese firms or companies like Dell who do their manufacturing and R&D in China...

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

Improving Compliance Performance in Your Supply Chain

March 05, 2012 Added by:Thomas Fox

One of the areas moving towards being incorporated into compliance programs is the supply chain. While many companies have focused significant compliance efforts towards the sales chain, the supply chain is now viewed as an area which requires compliance scrutiny...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intelligence Leaders Urge Congress to Act on Cyber Laws

February 06, 2012 Added by:Headlines

Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

ENISA Report on Maritime Cyber Security

December 20, 2011 Added by:Stefano Mele

Due to the high complexity, it is major challenge to ensure adequate maritime cyber security. Development of good practices for the technology development and implementation of ICT systems would therefore ensure “security by design” for all critical maritime ICT components...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Importance of a Secure Supply Chain in Selecting IT Vendors

December 07, 2011 Added by:Emmett Jorgensen

There have been numerous reports of rootkits and trojans that have been installed on component level chips designed to infiltrate networks from the inside. Government agencies have stepped up their diligence regarding what products are allowed to protect infrastructure at high security levels...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Espionage: Protecting American Innovation in Cyberspace

November 23, 2011 Added by:Headlines

"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

India Assumes Global Leadership Role in Cybersecurity

November 15, 2011 Added by:Headlines

“India welcomes the decision of the EastWest Institute to bring this powerful forum to New Delhi. Working together with like-minded countries and businesses worldwide, India will work hard to assure that practical advances in cybersecurity are made and international cooperation advanced..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

Message Queuing Insecurity

August 24, 2011 Added by:Danny Lieberman

Well placed attacks on message queues in an intermediary player, for example a payment clearing house, could result in the inability of the processor to clear transactions but also serve as an entry point into upstream and downstream systems. These attacks can and do cascade...

Comments  (0)

5029f8f9d65d988cb378fc0290f86cc4

Gap Analysis in Supply Chain Management

August 17, 2011 Added by:Mary Shaddock Jones

In many industries, international trade is more of a necessity than a luxury. The ability of a company to compete and financially grow in a particular industry may depend upon tailoring a program to buy and sell goods and services from and to companies and consumers in other countries...

Comments  (0)

Page « < 1 - 2 > »
Most Liked