Groups Similar Look up By Text Browse About



Similar articles
Article Id Title Prob Score Similar Compare
217965 TECHREPUBLIC 2021-10-12:
How to protect your organization from security threats across your supply chain
1.000 Find similar Compare side-by-side
217782 VENTUREBEAT 2021-10-12:
Software supply chain breaches are ‘staggeringly high,’ report finds
0.924 0.575 Find similar Compare side-by-side
218185 TECHREPUBLIC 2021-10-13:
How to get the most bang for your buck out of your cybersecurity budget
0.153 0.557 Find similar Compare side-by-side
218102 VENTUREBEAT 2021-10-13:
Why enterprises are massively subcontracting cybersecurity work
0.138 0.515 Find similar Compare side-by-side
217851 VENTUREBEAT 2021-10-12:
Enterprises struggle with security monitoring ‘tool sprawl’
0.607 0.489 Find similar Compare side-by-side
217890 VENTUREBEAT 2021-10-13:
Cyberattack response time averages 2 days, report finds
0.120 0.472 Find similar Compare side-by-side
217897 VENTUREBEAT 2021-10-8:
Why enterprise patch management pains are cybercriminals’ gain
0.459 Find similar Compare side-by-side
218133 ZDNET 2021-10-15:
Critical infrastructure security dubbed 'abysmal' by researchers
0.417 Find similar Compare side-by-side
218114 ZDNET 2021-10-15:
Brazilian insurance giant Porto Seguro hit by cyberattack
0.406 Find similar Compare side-by-side
217973 VENTUREBEAT 2021-10-13:
Cyber risk monitoring platform Black Kite raises $22M
0.395 Find similar Compare side-by-side
218134 VENTUREBEAT 2021-10-14:
Report: 24% of companies have paid millions in audit fees
0.385 Find similar Compare side-by-side
218038 ZDNET 2021-10-12:
Olympus suffers second cyberattack in 2021
0.382 Find similar Compare side-by-side
217989 TECHREPUBLIC 2021-10-12:
Top 5 tips for remote security
0.378 Find similar Compare side-by-side
217922 TECHREPUBLIC 2021-10-11:
How to combat the most prevalent ransomware threats
0.372 Find similar Compare side-by-side
218073 VENTUREBEAT 2021-10-14:
Battling new cyberthreats in your hybrid work environment (VB Live) (VB Live)
0.367 Find similar Compare side-by-side
217869 ZDNET 2021-10-13:
1 in 15 organizations runs actively exploited version of SolarWinds: Report
0.366 Find similar Compare side-by-side
218075 TECHREPUBLIC 2021-10-14:
Broadcom Software's Symantec Threat Hunter Team discovers first-of-its-kind ransomware
0.350 Find similar Compare side-by-side
218009 ZDNET 2021-10-11:
Ransomware is the biggest cyber threat to business. But most firms still aren't ready for it
0.350 Find similar Compare side-by-side
217900 VENTUREBEAT 2021-10-9:
Your cybersecurity team will face burnout, and you need to help
0.349 Find similar Compare side-by-side
218060 VENTUREBEAT 2021-10-15:
Cybersecurity report reveals critical business vulnerabilities
0.349 Find similar Compare side-by-side
218183 ZDNET 2021-10-14:
HP Wolf report highlights widespread exploitation of MSHTML, typosquatting and malware families hosted on Discord
0.341 Find similar Compare side-by-side
218177 ZDNET 2021-10-14:
Microsoft king of software audit, according to Flexera report
0.337 Find similar Compare side-by-side
218049 ZDNET 2021-10-14:
This new ransomware encrypts your data and makes some nasty threats, too
0.334 Find similar Compare side-by-side
218166 TECHREPUBLIC 2021-10-13:
3 risk management priorities CIOs are focused on right now
0.334 Find similar Compare side-by-side
218069 ZDNET 2021-10-15:
How AIOps is charting paths to fully autonomous networks
0.332 Find similar Compare side-by-side

1

ID: 217965

URL: https://www.techrepublic.com/article/how-to-protect-your-organization-from-security-threats-across-your-supply-chain/

Date: 2021-10-12

How to protect your organization from security threats across your supply chain

Defending your organization from cyberattacks that directly target you is difficult enough. But protecting yourself against attacks that hit you through your supply chain is even more of a challenge. How do you combat something over which you seemingly have little or no control? A report by cybersecurity provider BlueVoyant looks at supply chain security breaches and offers tips on how to prevent them. Released on Tuesday, the report titled Managing Cyber Risk Across the Extended Vendor Ecosystem is based on a survey of 1,200 CIOs, CISOs and chief procurement officers in large organizations throughout the U.S., the U.K., Canada, Germany, the Netherlands and Singapore. Commissioned by BlueVoyant and conducted by research firm Opinion Matters, the survey found that 97% of the respondents were hurt by a security breach that took place in their supply chain. Further, some 93% of those surveyed said their companies suffered a security breach themselves due to a weakness in a supply chain partner or third-party vendor. As a result, supply chain threats have received a renewed focus. Last year, 31% of the respondents said that supply chain and third-party risks were not a priority. This year, only 13% of those surveyed said that this type of risk was not on their radar. But a greater focus on supply chain threats doesn't automatically make them easier to detect. Among the respondents, 38% said they have had no way of knowing when or if a security issue occurs with a third-party vendor. Some 41% revealed that if they had discovered an issue and informed their supplier, they would be unable to confirm whether or not the problem had been resolved. This year has seen a number of cyberattacks and exploits that affected supply chain partners. A vulnerability in Microsoft Exchange exploited by a China-based group impacted thousands of companies with Exchange servers. The ransomware attack against Colonial Pipeline hurt fuel suppliers across the East Coast. And the ransomware incident against enterprise IT firm Kaseya trickled through to more than 1,000 organizations. To help you better manage and respond to supply chain threats, BlueVoyant offered the following recommendations: Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays