Security News > 2020 > May > Abnormal Security launches VendorBase to help orgs reduce supply chain cybersecurity risk
This unprecedented access gives organizations the ability to see detailed views of all vendors, including profile information, the VendorBase risk assessment score, explanations on risk scores, a timeline view of relevant email communication and security activity for that vendor.
"Before VendorBase, organizations lacked clear visibility of the BEC risk from their supply chains. This new capability greatly mitigates this risk and makes it much easier for organizations to directly remediate and investigate BEC attacks from compromised vendors."
Through VendorBase, the Abnormal Security platform automatically computes a risk score for each vendor by evaluating email communication across three areas: if the vendor's domains have been impersonated or spoofed; if the vendor has been compromised; if the vendor is not legitimate or is a suspicious vendor.
VendorBase also gathers reports from all customers and uses the results as part of the risk score computation, which is fed back into the VendorBase so it can be used by all Abnormal Security customers.
"Before VendorBase, ensuring that organizations had the necessary visibility of the risk coming in from the supply chain, and even from customers, required a good deal of manual effort on their side," said Rami Habal, CPO, Abnormal.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/i559-qNu3nw/
Related news
- The ROI of Security Investments: How Cybersecurity Leaders Prove It (source)
- Australia Passes Groundbreaking Cyber Security Law to Boost Resilience (source)
- Supply chain managers underestimate cybersecurity risks in warehouses (source)
- Top 5 Cyber Security Trends for 2025 (source)
- Shape the future of UK cyber security (source)
- Update your OpenWrt router! Security issue made supply chain attack possible (source)
- Strengthening security posture with comprehensive cybersecurity assessments (source)
- Overlooking platform security weakens long-term cybersecurity posture (source)