Security News
![Supply Chain Attacks Nearly Doubled in 2018: Symantec](/static/build/img/news/alt/data-breach-stats-small.jpg)
The number of supply chain attacks observed last year was 78% higher compared to the previous year, a new Symantec report reveals. read more
![PHP PEAR supply chain attack: Backdoor added to installer](/static/build/img/news/alt/cyberthreat-stats-small.jpg)
Some additional details have emerged about the recent security breach involving the PHP PEAR (PHP Extension and Application Repository) webserver, but much is still unknown. What happened? The...
![Small manufacturers play important role in supply chain security](/static/build/img/news/alt/hackers-statistics-small.jpg)
Though the manufacturing sector does not attract the sheer volume of total cyberattacks as other areas of the economy, research has shown that coordinated cyber espionage targets manufacturing...
![Supply Chain Security: Managing a Complex Risk Profile](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
Experts sound off on how companies can work with their third-party suppliers and partners to secure the end-to-end supply chain.
![Supply chain compromise: Adding undetectable hardware Trojans to integrated circuits](/static/build/img/news/alt/phishing-stats-2-small.jpg)
Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible through power-based...
![That Bloomberg Supply-Chain-Hack Story](/static/build/img/news/alt/hackers-statistics-small.jpg)
Back in October, Bloomberg reported that China has managed to install backdoors into server equipment that ended up in networks belonging to -- among others -- Apple and Amazon. Pretty much...
![AI, supply chain, and IoT risks will dominate the 2019 cyberthreat landscape](/static/build/img/news/alt/IoT-Cybersecurity-Predictions-2-small.jpg)
Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.
![DUST Identity Emerges From Stealth to Protect Device Supply Chain](/static/build/img/news/alt/ransomware-statistics-small.jpg)
Boston, MA-based start-up firm DUST Identity has emerged from stealth with $2.3 million seed funding led by Kleiner Perkins, with participation from New Science Ventures, Angular Ventures, and...
![Government Perspective on Supply Chain Security](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
This is an interesting interview with a former NSA employee about supply chain security. I consider this to be an insurmountable problem right now....
![Supply Chain Security 101: An Expert’s View](/static/build/img/news/alt/breach-statistics-small.jpg)
Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. alongside Tony Sager, senior vice president and chief evangelist at the Center for Internet Security and a former bug...