SCRM Library Updates
Zero Trust Privacy Assessment and Guidance
This publication provides guidance on how to use Zero Trust in privacy implementation. It highlights the core principles of privacy…
Managing supply chain resilience assessment model-relevant factors and activities using an FCM-FBWM approach
Supply chain resilience is essential for companies to survive in today’s competitive market, as they face environmental and unforeseeable challenges in…
Same destination, different roadmaps: the journey to zero trust architecture
While all federal agencies are striving to reach the same place, no two agencies are taking the same path to…
President Biden Formalizes White House Council on Supply Chain Resilience
On June 14, 2024, President Biden issued an Executive Order on White House Council on Supply Chain Resilience (the “Order”). The Order,…
Executive Order on White House Council on Supply Chain Resilience
By the authority vested in me as President by the Constitution and the laws of the United States of America,…
The role of technology in supply chain risk management: Innovations and challenges in logistics
The paper explores the myriad of risks faced by modern supply chains, ranging from natural disasters and geopolitical tensions to…
Recent SCRM News
Zero Trust Privacy Assessment and Guidance
This publication provides guidance on how to use Zero Trust in privacy implementation. It highlights the core principles of privacy…
Warning Against Phishing Emails Distributing GuLoader Malware by Impersonating a Famous International Shipping Company
AhnLab SEcurity intelligence Center (ASEC) recently identified the distribution of GuLoader malware via a phishing email by impersonating a famous…
Space supply chain gaps: Propulsion, hardened electronics and laser links
Despite ongoing efforts by the Defense Department to bolster the space supply chain, government and commercial satellite programs continue to struggle…
US congressional panel urges Americans to ditch China-made routers
A U.S. congressional committee on Wednesday urged Americans to remove Chinese-made wireless routers from their homes, including those made by…
nRootTag: 1.5 Billion iPhones Used for Malicious Tracking
According to the researchers, a complete fix could take several years, as Apple would need to update all Find My-compatible…
Protecting Your Software Supply Chain: Assessing the Risks Before Deployment
Cybercriminals have recognized that instead of attacking an organization head-on, they can infiltrate through the software supply chain—like slipping counterfeit…
SCRM Events
Accelerate Together: Zero Trust 2025
During this one-day event, technology and systems engineering leaders from AWS and its partners will detail the ways their tools…
OSINT Unveiled: The Technology Behind the Intelligence – ODNI Edition
Feb 27, 2025 2:00 p.m. ET – Webinar Join us for a discussion on the evolving role of OSINT in national…
Federal Executive Forum Cybersecurity for Defense and Homeland Progress and Best Practices 2025
Government cybersecurity strategies are constantly evolving to address new threats. The Departments of Defense and Homeland Security prioritize proactive defense,…
Federal News Network’s Industry Exchange Cyber 2025
Jan 27, 2025 1:00 p.m. ET Webinar Cybersecurity requires constant vigilance but also continual evolution. Are you staying safe today…
Defend Against Ransomware Attacks Cyber Range Training
Tuesday, January 7, 2025 Time: 9:00 AM EST – 1:00 PM EST Location type: Virtual/Online Format: Webinar The Cybersecurity and…
Federal Executive Forum Zero Trust Strategies in Government Progress and Best Practices 2024
Dec 3, 2024 1:00 p.m. ET Type: Webinar How far have agencies progressed in their zero trust journey, and how have…