Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Keywords: » supply chain cyber security

Items Tagged with 'supply chain cyber security'

ARTICLES

Laptop

New Research: Multi-Stage Malware Attack on Python Package Index Discovered

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
June 18, 2025

Researchers have discovered that the Python Package Index (PyPI) has a malicious package in its repository.


Read More
Computer open on desk beside cell phone

Navigating the regulatory and compliance landscape of 2025

Steve Brining
November 14, 2024

As security leaders look ahead to 2025, the regulatory and compliance landscape is set to undergo a significant transformation.


Read More
Stacked shipping containers

Supply chain cybersecurity and modern-day cargo theft

Ehrich headshot
Mike Ehrich
August 15, 2024

As cargo theft becomes increasingly sophisticated, companies must adapt. 


Read More
Modern building with blue sky in background

99% of Global 2000 organizations are linked to a supply chain breach

Security Staff
August 5, 2024

99% of Global 2000 organizations have been directly linked to a supply chain breach.


Read More
5 Minutes with Scott Reynolds
5 Minutes With

Automating a more resilient supply chain

Jordyn Alger, Managing Editor, Security magazine
Jordyn Alger
April 24, 2024

As technology evolves, manufacturers can leverage new tools to reduce costs while improving accuracy, visibility and customer satisfaction.


Read More
Computer screen displaying code

Are AI data poisoning attacks the new software supply chain attack?

Iyer Headshot
Sitaram Iyer
April 18, 2024

With rapid AI adoption happening across varying business units, maintaining the integrity of those systems is a growing concern.




Read More
Red digital lines on black screen

Adapting to the latest SEC disclosures

Deepika Gajaria
April 5, 2024

Threats such as cyberattacks, supply chain attacks, network intrusions, and ransomware are now an everyday occurrence, causing significant damage. 


Read More
Data cloud security
Cyber Tactics

Better software supply chain security through SBOMs

Creating a cybersecurity supply chain governance framework is a critical step in securing your organization’s digital supply chain.
Pam Nigro headshot
Pam Nigro
February 12, 2024

n today's interconnected digital landscape, the integrity and security of software components used in products and services are of paramount importance.


Read More
empty meeting room with glass windows
Global News

Closing the gap between physical and cybersecurity

Taelor Daugherty
Taelor Sutherland
February 7, 2024

With in-person work increasing, security leaders have looked into improving their physical security solutions.


Read More
boxes in warehouse

47% of organizations monitored supply chain risks monthly or more

Security Staff
December 7, 2023

According to a report, there was a 26% increase in supply chain breaches in 2022 and 9% of organizations are working with suppliers to fix them.


Read More
More Articles Tagged with 'supply chain cyber security'
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing