The integration of third-party components and software is an increasingly critical area of security risk that needs more attention from medical device manufacturers, says Anura Fernando, global head ...
BlueVoyant, a leader in integrated cybersecurity, is launching its Software Bill of Materials (SBOM) management offering, helping organizations reduce risk related to software by automating the ...
FORRESTER SECURITY & RISK CONFERENCE — Companies need to take steps to minimize the risk posed by third-party software in the supply chain, which has grown significantly over the past few years, ...
Two Purdue University researchers are taking aim at the growing surge of supply chain attacks, particularly those directed at third-party software suppliers and vendors connected to the actual target.
Increasingly complex business partnerships and rising reliance on third-party software components are proving to be ever weakening cybersecurity links. Many enterprises are at growing risk due to ...
Software supply chain cyberattacks are more firmly in the spotlight thanks to several recent high-profile attacks with global impact. According to an Identity Theft Resource Center report, "more than ...
The latest software library compromise of an obscure but popular file compression algorithm called XZ Utils shows how critical these third-party components can be in keeping enterprises safe and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results