Developing Supply Chain Capabilities Through Digitalization and Viability for Controlling the Ripple Effect

The COVID-19 pandemic affected all industries and presented manufacturing firms with enormous challenges, with considerable changes in consumer demand for goods and services. Supply chain management disruption caused by the COVID-19 outbreak resulted in several socio-economic roadblocks. The slow propagation of disruption risk results in a ripple effect along the entire chain. The lack of resilience and risk management capability is the prime cause, attributed to the unavailability of digital resources, skills, and knowledge. 

Read Full Publication

Cybercriminals exploit SVB collapse to steal money and data

The collapse of the Silicon Valley Bank (SVB) on March 10, 2023, has sent ripples of turbulence throughout the global financial system, but for hackers, scammers, and phishing campaigns, it’s becoming an excellent opportunity.

As multiple security researchers report, threat actors are already registering suspicious domains, conducting phishing pages, and gearing up for business email compromise (BEC) attacks.

Read Full Article

Take a Programmatic Approach to Your Zero Trust Journey

Virtual Event

Apr 20, 2023

Time: 10:00 AM – 12:30 PM ET

Location: Web Conference

Zero trust journeys typically start down one of two paths: (1) With a formal strategy to build a holistic program; or (2) tackling point projects employing zero trust principles of least privilege and least trust. This session walks through the policy and planning steps for both paths to move your zero trust transformation forward. 

Register Now

US introduces new rules to protect water systems from hackers


The US Environmental Protection Agency on Friday announced new requirements for public water facilities to boost their cybersecurity while expressing concern that many facilities have failed to take basic steps to protect themselves from hackers.

The new EPA memo requires state governments to audit the cybersecurity practices of public water systems — and then use state regulatory authorities to force water systems to add security measures if existing ones are deemed insufficient.

Read Full Article

‘No easy answer’ on managing battery storage supply chain issues, but things are getting better

Managing your battery energy storage system (BESS) supply chain is a complex issue with no easy fixes, according to leading developers, system integrators and investors. That was the message from panelists on the ‘Effective Management of Supply Chains’ on day one of Energy Storage Summit in London last week (22/23 February). Supply chain has been a major topic in the BESS industry in the past few years,

Read Full Article

Hydrochasma: An Emerging Threat to Asia’s Medical and Shipping Industries

A new player has emerged in the realm of cyber threats: Hydrochasma. According to Symantec’s investigation, this group has set its sights on medical laboratories and shipping firms in Asia. This previously unknown group was found to have no links to any known threat actors, but it appears to be interested in industries involved in COVID-19 treatments or vaccines.

Read Full Article

Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks

Demand forecasting (DF) plays an essential role in supply chain management, as it provides an estimate of the goods that customers are expected to purchase in the foreseeable future. While machine learning techniques are widely used for building DF models, they also become more susceptible to data poisoning attacks. In this article, we study the vulnerability of targeted poisoning attacks for linear regression DF models, where the attacker controls the behavior of forecasting models on a specific target sample without compromising the overall forecasting performance.

Full Publication

Assess Your Supply Chain in Line with NIST C-SCRM

Virtual Event

Mar 1, 2023

Time: 10:00 AM – 12:30 PM ET

Location: Web Conference

Assess Your Supply Chain in Line with NIST C-SCRM 

The NIST Cybersecurity-Supply Chain Risk Management guidelines released in May 2022 establish 12 coverage areas (many of which are outside traditional information security boundaries) and put a spotlight on the importance of robust, accurate evaluations as part of any supply chain security strategy. 

Register Now: