• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: supply chain attack

Kaseya Confirms Sophisticated Cyberattack Over The Holiday Weekend

Cyberattack against Kaseya shows hackers are becoming strategic and targeting remote managed service providers.

July 6, 2021 Alyssa Borelli Leave a Comment

Cyberattack against Kaseya shows hackers are becoming strategic and targeting remote managed service providers.

Read More

Proofpoint CISO, CISOs cyberattack

CISA: SolarWinds Likely Not The Only Supply Chain Compromise in Massive Hack

The U.S. Cybersecurity and Infrastructure Agency believes there are other IT supply chain compromises in addition to SolarWinds' Orion Platform.

December 17, 2020 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Agency (CISA) is aware of other attack methods on the IT supply chain in addition to known malware that infected SolarWinds’ Orion IT management platform. In an alert issued Thursday, the agency said it “has evidence of additional initial access vectors, other than the SolarWinds Orion platform; however these are […]

Read More

IBM COVID-19 Vaccine Supply Chain

IBM: Hackers Targeting COVID-19 Vaccine Supply Chain

IBM’s cybersecurity team has uncovered a global phishing campaign that targets organizations associated with COVID-19 vaccine supply chains.

December 3, 2020 Zachary Comeau Leave a Comment

IBM’s cybersecurity team has uncovered a global phishing campaign that targets organizations associated with COVID-19 vaccine supply chains. Specifically, attackers are targeting the cold chain – a component of the vaccine supply chain that preserves vaccines in temperature-controlled environments during transportation and in storage, according to IBM. This “calculated operation” began in September and spanned […]

Read More

Cybersecurity Skills Gap

U.S., UK Agencies Warn of Increased Cyber Attacks During COVID-19

A new joint advisory from U.K. & U.S. cybersecurity officials warns that cyber criminals are targeting individuals and organizations at an increasing rate.

April 8, 2020 Zachary Comeau Leave a Comment

A new joint advisory from U.K. and U.S. cybersecurity officials warns that cyber criminals are targeting individuals and organizations with a range of hacking tools like ransomware and malware. With the U.S. and much of Europe under government-imposed lockdowns due to COVID-19, many employees are working from home to help prevent the spread of the […]

Read More

The Risks and Mitigations of the Internet of Things (IoT) in Supply Chain

When it comes to product delivery, many companies are introducing the Internet of Things (IoT) into the supply chain through connected devices.

February 19, 2018 Abel Sussman Leave a Comment

When it comes to product delivery, many companies are introducing the Internet of Things (IoT) into the supply chain through connected devices.

Read More

SASE, SASE approaches, SASE implementation

Proofpoint Unveils New Innovations to Combat Increasingly Common Threats

Proofpoint's latest solutions empower organizations to stop malicious email attacks, detect and prevent identity-based threats and more.

April 24, 2023 TD Staff Leave a Comment

Ahead of the 2023 RSA Conference, Proofpoint, Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company, unveiled a host of innovations across its Aegis Threat Protection, Identity Threat Defense and Sigma Information Protection platforms. The company’s latest solutions empower organizations to stop malicious email attacks, detect and prevent identity-based threats and defend sensitive data from theft, loss and insider […]

Read More

CISA Software Security

Software Manufacturers Urged to Think Security Before Features, Speed to Market

CISA and other cybersecurity agencies are urging tech companies to think more about security of their products.

April 13, 2023 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency along with its counterpart agencies from several different countries have published a new guide urging software manufacturers to take steps to ship products that are built with security from the ground up. The guidance, “Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default, comes […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Is Your Organization Testing Against the Right Cyber Threats?

New research shows that organizations are testing against cyber threats in the headlines rather than attacks they're more likely to face.

April 12, 2023 Zachary Comeau Leave a Comment

Ransomware, supply chain attacks and nation-state threat actors have grabbed mainstream headlines in recent years, and organizations are largely recognizing that they must invest more in cybersecurity to defend against those emerging techniques. However, new research shows that some organizations are prioritizing defending against those trending, newsworthy threats at the expense of the threats actually […]

Read More

cybersecurity mesh architecture CSMA, ZTA

Building a Foundation for Zero Trust with Cybersecurity Mesh

A cybersecurity mesh architecture (CSMA) goes beyond ZTA and suggests a deeper, better integrated layer of security.

August 31, 2022 Wes Wright Leave a Comment

It seems like there are more acronyms, labels and methods for bolstering security than ever before – and making sense of them all is proving to be just as complex as the infrastructure they’re meant to secure. One widely embraced term, zero-trust architecture (ZTA), calls for continually vetting users as they access different applications and […]

Read More

Codenotary First to Provide Continuously Updated and Fully Searchable Tamper-Proof Information about Software Components in Container Images

June 28, 2022 TechDecisions Staff Leave a Comment

SBOM Operator for Kubernetes allows users to continuously be aware of all software and software dependencies running in Kubernetes HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, leaders in software supply chain security, today launched SBOM Operator for Kubernetes in both its open source Community Attestation Service, as well as Codenotary’s Trustcenter, the company’s flagship product, that mitigates the risk of […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Interim pages omitted …
  • Page 17
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.