Security News
![Microsoft Uncovers Multi-Tier Supply Chain Attack](/static/build/img/news/alt/DDoS-small.jpg)
Microsoft has shared details of a new attack that attempted to spread crypto-mining malware to a large number of users by compromising the software supplying partner of an application developer. read more
![Securing the supply chain: Organizations need best practices in proactive security](/static/build/img/news/alt/managed-security-small.jpg)
CrowdStrike announced the results of its global supply chain survey, Securing the Supply Chain, produced by research firm Vanson Bourne. The study surveyed 1,300 senior IT decision-makers and IT...
![Software Supply Chain Increasingly Targeted in Attacks: Survey](/static/build/img/news/alt/data-breach-stats-small.jpg)
Organizations increasingly have to deal with cyberattacks targeting the software supply chain and in many cases they are not adequately prepared to respond to such incidents, according to a report...
![What is the fastest growing cyberthreat? 80% say supply chain attacks](/static/build/img/news/alt/phishing-statistics-cybersecurity-scaled-small.jpg)
A new report from CrowdStrike found that two-thirds of respondents experienced a supply chain attack within the last year.
![ThreatList: Supply-Chain Defenses Need Improvement](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Few organizations are prepared to mitigate supply-chain risks, despite a majority of them acknowledging they are a huge cyber threat.
![Infosec defenders' supply chain is inferior to black hats, says Carbon Black CEO](/static/build/img/news/alt/Data-Cybersecurity-Predictions-2-small.jpg)
Cloudy analytics as an experience aggregator to the rescue? Maybe The security industry’s supply chain is currently inferior to attackers, says Carbon Black CEO Patrick Morley, but he thinks the...
![Qualys streamlines supply chain GDPR compliance assessment with cloud app](/static/build/img/news/alt/cloud-cybersecurity-statistics-small.jpg)
Qualys announced new functionality in its Security Assessment Questionnaire (SAQ) cloud app that allows customers to better achieve visibility of data across their own network and supply chain for...
![Understanding the supply chain of stole data](/static/build/img/news/alt/web-statistics-small.jpg)
Terbium chief research officer Munish Walther-Puri explains how hacked data moves from your personal accounts to the Dark Web.
![Supply-Chain Security](/static/build/img/news/alt/managed-security-small.jpg)
Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. It's a legitimate fear, and...
![NIST Updates Cybersecurity Framework to Tackle Supply Chain Threats, Vulnerability Disclosure and More](/static/build/img/news/alt/breach-statistics-small.jpg)
Version 1.1 includes updates on authentication and identity, self-assessment, supply-chain security and vulnerability disclosure, among other changes.