searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

supply chain

Get our top stories in your inbox

How confident are IT pros in the security of their organization’s supply chain?

June 15, 2022

Over the last two years, supply chain challenges have rocked both enterprises and consumers alike, making it harder to access certain goods and maintain business continuity. …

Boards, CEOs demand software supply chain security improvements

June 7, 2022

Venafi announced the findings of a global study of 1,000 CIOs, in which 82% say their organizations are vulnerable to cyberattacks targeting software supply chains. The shift …

Massive shadow code risk for world’s largest businesses

June 2, 2022

Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply …

Can we trust the cybersecurity of the energy sector?

May 25, 2022

A research published by DNV reveals that energy executives anticipate life, property, and environment-compromising cyberattacks on the sector within the next two years. The …

Best practices for healthcare delivery organizations to manage supply chain cybersecurity risks

May 17, 2022

The Cloud Security Alliance (CSA) released a paper titled Healthcare Supply Chain Cybersecurity Risk Management. Drafted by the Health Information Management Working Group, …

A 10-point plan to improve the security of open source software

May 13, 2022

The Linux Foundation and the Open Source Software Security Foundation, with input provided by executives from 37 companies and many U.S. government leaders, delivered a …

The SaaS-to-SaaS supply chain is a wild, wild mess

May 13, 2022

Cloud migration and IT democratization have created a continuously growing network of interconnected business applications, integrated to digitize and automate business …

NIST updates guidance for cybersecurity supply chain risk management

May 6, 2022

The National Institute of Standards and Technology (NIST) has updated its guidance document for helping organizations identify, assess and respond to cybersecurity risks …

How IIoT solutions can optimize industrial supply chain operations

April 29, 2022

Ivanti Wavelink announced the results of a joint survey with VDC Research regarding the state of industrial supply chain operations and the adoption of Industrial Internet of …

The state of open-source software supply chain security in 2022

April 21, 2022

In this video for Help Net Security, Donald Fischer, CEO at Tidelift, talks about the state of open-source software supply chain security in 2022. Open source is the modern …

Challenges development teams face when building applications with open source

April 20, 2022

Tidelift released a report providing critical insights into the state and practice of open source software supply chain management. This comprehensive study of nearly 700 …

Security flaws found in 82% of public sector software applications

April 4, 2022

Veracode has released new findings that show the public sector has the highest proportion of security flaws in its applications and maintains some of the lowest and slowest …

Posts navigation

1 2 3 4 5 6 7 8 … 11

Featured news

  • Malicious ads creep into Bing Chat responses
  • How should organizations navigate the risks and opportunities of AI?
  • Why California’s Delete Act matters for the whole country
Guide: SaaS Offboarding Checklist

Sponsored

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Free entry-level cybersecurity training and certification exam

Guide: Attack Surface Management (ASM)

Don't miss

Malicious ads creep into Bing Chat responses

How should organizations navigate the risks and opportunities of AI?

Why California’s Delete Act matters for the whole country

Yet another Chrome zero-day exploited in the wild! (CVE-2023-5217)

How to avoid the 4 main pitfalls of cloud identity management

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us