Security leaders should focus on risk management principles when tackling software supply chain security, according to the Center for Internet Security SVP and Chief Evangelist Tony Sager.
Application security remains a wide attack vector for cybercriminals, but cybersecurity leaders can use tools to better detect vulnerabilities in their applications and software supply chains.
The Port of Vancouver USA has partnered with the Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) to launch the Lower Columbia River Maritime Information Exchange (LCR-MIX), hardening the port system against cyberattacks.
Managing third-party risk is integral to maintaining enterprise cybersecurity and supply chain security. Determining who in the enterprise is responsible for third-party vendor security can help reduce risk, according to NCC Group research.
Cybersecurity experts weigh in on the National Institute of Standards and Technology (NIST)'s updated guidelines for maintaining software supply chain security.
Despite advancements in cybersecurity practices, compromised passwords remain responsible for the vast majority of data breaches today. Using zero knowledge password proof (ZKPP) may help organizational password security.
Critical infrastructure industries, especially those in the manufacturing, logistics and oil and gas sectors, have recently faced high-profile cyberattacks. How and why are these sectors targeted, and what can cybersecurity professionals do to secure their organizations?
Two standards from the International Electrotechnical Commission (IEC) can help cybersecurity professionals choose the best strategies in securing their industrial control systems.