Supply Chain Security

Supply Chain Security news, information, and how-to advice


steel chain with broken link close up 55909938

Insecure Connections: Enterprises hacked after neglecting third-party risks

Third-party security is continuously lacking, yet few leaders show concern or take action

stack of documents

Study examines the problems with metadata and file sharing

A study by Workshare, a company focused on secure file sharing applications, says that 68 percent of the 800 professionals surveyed failed to remove metadata before sharing documents. Due to this oversight, potentially sensitive...

Six ways to prevent a breach like the one at AT&T

A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

Why you need to embrace the evolution of APT

Instead of cringing at the frequently misused concept of the advanced persistent threat, the smart play is to embrace the evolution and take three actions that guide a necessary shift in the way we practice information security today

binary hard drive

Purchase order scams now targeting construction suppliers

Earlier this year, Salted Hash reported on a wave of purchase order scams targeting university suppliers. Recently, scammers have expanded their scheme, by targeting industrial construction contractors and suppliers.

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on

Target credential theft highlights third-party vendor risk

Retailer discloses that attackers stole credentials from vendor to break into its network

Purchase order scam targeting university suppliers

Salted Hash has obtained a copy of a warning letter from Boston College addressed to all of their suppliers. In it, the university says that emails claiming to be from the school are requesting product quotes for merchandise and...

Amazon's promise of postal drones rides on a bed of hot air

Over the holiday weekend, millions watched as Jeff Bezos, Amazon's CEO, told 60 Minutes how he plans to use drones (customized octocoptors) to deliver packages. The service, known as PrimeAir , will fly packages that are less than...


A conversation with Graydon McKee on protecting intellectual property and "keeping secrets secret"

How do you protect the intellectual property of a company -- especially in manufacturing -- as it moves from groundbreaking idea to reality? That's the challenge Graydon McKee built a career solving. With expertise protecting the...

Espionage campaign targeting Asian supply chains uncovered

Kaspersky Lab has released details on an espionage campaign active since 2011, which targeted organizations in Japan and South Korea, which are key elements to Western supply chains

Working the kinks out of your supply chain

Improvements in speed and visibility provide payoff for business and security

3 MORE tabletop exercises for business continuity

Practice makes perfect - so put your BC/DR plans to the test

Load More