GroupSense’s director of intelligence operations Bryce Webster-Jacobsen outlines the U.S. Department of Defense’s Cybersecurity Maturity Model Certification’s Impact on Defense Contractors.
While providing access for third-party, non-employees is critical to meeting business objectives, it oftentimes has the unintended consequence of exponentially increasing an organization’s attack surface. With the proper identity-proofing practices and capabilities in place, organizations can verify the identities of their users, support risk management initiatives and better protect critical assets – eliminating the third-party risk management blind spots.
Claroty researchers have uncovered six critical vulnerabilities in third-party license management components, which could expose operational technology (OT) environments (hardware and software components) across numerous industries to exploits via cyberattacks.
UL announced the debut of its Supplier Cyber Trust Level solution, which it says helps organizations minimize supply chain cybersecurity risk by focusing on the trustworthiness of suppliers’ security practices.