Kaseya’s VSA product has been the victim of a sophisticated ransomware attack, affecting 60 Kaseya customers and an estimated 1,500 downstream businesses. Attackers are allegedly demanding $70 million in return for a universal decryptor software key that would unscramble all affected machines.
Threat intelligence is only one piece of the puzzle when it comes to improving supply chain security. As part of protecting the supply chain and reducing third-party risk, here's how your organization should get started.
Long-time cyberveteran with the USAF and currently Federal Practice Lead at A-LIGN, Tony Bai and Joe Cortese, Penetration Testing Practice at A-LIGN, navigate the complex future of supply chain security and discuss who should be responsible for supply chain protection.
Nearly all (94%) of security and business decision-makers in the Interos Global Supply Chain Report study reported some negative impact to revenue resulting from supply chain disruption, which they attributed to a variety of supply chain risks including cyber breaches, financial risks, and ESG (environment, social, governance) transparency issues.
Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain. Kirsten Provence has led Boeing’s supply chain security program for nearly a decade; here she explains what has propelled efficiency gains by scaling the program using subsidiaries.
Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain. Kirsten Provence has led Boeing’s supply chain security program for nearly a decade; here she explains what has propelled efficiency gains by scaling the program using subsidiaries.
In the spirit of building a solid foundation, Zero Trust security has once again come into the forefront. Whie the concept of Zero Trust is not new, the reality is that not enough organizations have adopted those in IT and security, the concept of identity-centric protection isn’t anything new.
The first RSA Conference took place 30 years ago. It was conceived by the then-CEO Jim Bidzos, and consisted of roughly 50 people in a room discussing cryptography – the focus area of that first assembly. By the turn of the millennium, the conference expanded internationally, reaching audiences in Europe, China, Singapore and Abu Dhabi. Ten years later in 2011, the RSA Conference boasted an impressive 18,500 attendees in the United States alone.
Rapid7 has disclosed that the attackers behind the Codecov breach had accessed some of the company's source code using a previously compromised Bash Uploader script from Codecov.
BlackBerry Limited released its 2021 BlackBerry Threat Report, detailing a sharp rise in cyberthreats facing organizations since the onset of COVID-19. The research shows a cybercrime industry which has not only adapted to new digital habits, but also become increasingly successful in finding and targeting vulnerable organizations.