News

In the face of rising cyber threats, CEOs who view disruption as an opportunity rather than a setback position their ...
Read about a position won by Exiger on GSA's SCRIPTS BPA for the procurement of supply chain risk illumination tools and analytic support services.
Pharmaceutical professionals can determine the effectiveness of their supply chain’s security measures in several ways. Penetration testing simulates a cyberattack or breach to identify gaps in ...
But this mystery isn't over yet, Unit 42 opines That massive GitHub supply chain attack that spilled secrets from countless projects? It traces back to a stolen token from a SpotBugs workflow - ...
On this "Face the Nation with Margaret Brennan" broadcast, Commerce Secretary Howard Lutnick and Sen. John Barrasso join ...
A "trust-based approach" can ensure a resilient supply chain that is adaptable to today’s—and tomorrow's—challenges.
Supply chain security emerges as perhaps the most significant vulnerability in CMMC 2.0 readiness. While 66% of organizations report having advanced controls for third-party CUI access, 29% ...
Protecting customer data across the entire supply chain requires a comprehensive, multi-layered strategy. From encryption and secure communication channels to third-party vendor management and ...