Automating a more resilient supply chain

Automating a more resilient supply chain

As technology evolves, manufactures can leverage new tools to reduce costs while improving accuracy, visibility and customer satisfaction. Emerging technologies such as Internet of Things (IoT) and artificial intelligence (AI) can increase efficiencies for manufactures. At the same time, this increase in technology may create openings for cyberattacks on the supply chain as well as critical infrastructure.  Here, we talk with Scott Reynolds, the President-Elect at International Society of Automation.  Security magazine: Tell us about your title…

Read More

Are AI data poisoning attacks the new software supply chain attack?

Are AI data poisoning attacks the new software supply chain attack?

With rapid AI adoption happening across varying business units, maintaining the integrity of those systems — and preventing AI data poisoning attacks — is a growing concern. But how do these attacks occur, and why should businesses be worried?  Much of it has to do with third-party access to business systems and data. In Venafi’s 2023 State of Cloud Native Security Report, 75% of security professionals stated their software supply chain presents their biggest security…

Read More

Better software supply chain security through SBOMs

Better software supply chain security through SBOMs

An executive order from President Biden in 2021 focused on enhancing software supply chain security. This added transparency can help to identify and mitigate security risks, such as vulnerabilities in open source components or malicious code that has been inserted into the supply chain. These Software Bills of Materials (SBOMs) play an important role in enhancing software supply chain security by providing transparency into the components used to build software. This requirement is designed to…

Read More

Closing the gap between physical and cybersecurity

Closing the gap between physical and cybersecurity

With an increase in in-person work, security leaders have looked into improving their physical security solutions. This could include updating their access control measures, video surveillance or hiring additional security staff. According to the Genetec State of Physical Security Report, 33% of respondents stated that their physical security systems were on-premises and 67% were cloud or hybrid-cloud. Fifty-five percent of respondents stated that their information technology (IT) department has access to physical security data. The…

Read More

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Non-human identities: Secure them now, not later

Non-human identities: Secure them now, not later

Non-human identities: Secure them now, not later | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Cybersecurity fundamentals for logistics partners

Cybersecurity fundamentals for logistics partners

Cybersecurity fundamentals for logistics partners | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Report: Supplier cyber weaknesses impact big business

Report: Supplier cyber weaknesses impact big business

Report: Supplier cyber weaknesses impact big business | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

98% of organizations have been impacted by a cyber supply chain breach

98% of organizations have been impacted by a cyber supply chain breach

98% of organizations have been impacted by a cyber supply chain breach | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Can developers reduce open source cybersecurity risk?

Can developers reduce open source cybersecurity risk?

Can developers reduce open source cybersecurity risk? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3 4