The Defense Department may now officials exclude contractors or subcontractors from receiving information technology contracts based on the risk their supply chain poses to national security systems, Fierce Government reports.
Gucci has been awarded $144.2 million in damages from counterfeit websites selling their products. The websites have 30 days to shut down their organization.
As an enterprise security professional managing information and cyber security, your duty is to protect your company’s data and confidential communications from theft or loss.
Enterprises can sometimes move faster than manufacturers when it comes to unique designs and security needs.
August 1, 2013
How do you protect assets using video surveillance in an environment that doesn’t have access to continuous power or network transmissions, and is managed by third parties offsite from your location, and is possibly governed by another countries’ laws?
The supply chain is a long and complex one. And one that needs protection along the way. At BJ’s Wholesale Club, there is everything from pallets of goods to choice steaks along the chain.
America’s largest commercial ports have failed to build up defenses against potential cyber attacks, a new study contends, raising concerns about the vulnerability of computer networks that help move energy, food and other goods to market, the Los Angeles Times reports.