The COVID-19 pandemic affected all industries and presented manufacturing firms with enormous challenges, with considerable changes in consumer demand for goods and services. Supply chain management disruption caused by the COVID-19 outbreak resulted in several socio-economic roadblocks. The slow propagation of disruption risk results in a ripple effect along the entire chain. The lack of resilience and risk management capability is the prime cause, attributed to the unavailability of digital resources, skills, and knowledge.
Cybercriminals exploit SVB collapse to steal money and data
The collapse of the Silicon Valley Bank (SVB) on March 10, 2023, has sent ripples of turbulence throughout the global financial system, but for hackers, scammers, and phishing campaigns, it’s becoming an excellent opportunity.
As multiple security researchers report, threat actors are already registering suspicious domains, conducting phishing pages, and gearing up for business email compromise (BEC) attacks.
A Comprehensive Framework for Migrating to Zero Trust Architecture
Migrating to Zero Trust Architecture (ZTA) is a strategic approach to strengthen the enterprise’s security postures. The shift to ZTA requires changes across the enterprise which can be challenging to achieve. Utilizing an effective framework for migrating from the old security architecture to ZTA can help ensure smooth transitioning to the Zero Trust journey.
Take a Programmatic Approach to Your Zero Trust Journey
Virtual Event
Apr 20, 2023
Time: 10:00 AM – 12:30 PM ET
Location: Web Conference
Zero trust journeys typically start down one of two paths: (1) With a formal strategy to build a holistic program; or (2) tackling point projects employing zero trust principles of least privilege and least trust. This session walks through the policy and planning steps for both paths to move your zero trust transformation forward.
US introduces new rules to protect water systems from hackers
The US Environmental Protection Agency on Friday announced new requirements for public water facilities to boost their cybersecurity while expressing concern that many facilities have failed to take basic steps to protect themselves from hackers.
The new EPA memo requires state governments to audit the cybersecurity practices of public water systems — and then use state regulatory authorities to force water systems to add security measures if existing ones are deemed insufficient.
‘No easy answer’ on managing battery storage supply chain issues, but things are getting better
Managing your battery energy storage system (BESS) supply chain is a complex issue with no easy fixes, according to leading developers, system integrators and investors. That was the message from panelists on the ‘Effective Management of Supply Chains’ on day one of Energy Storage Summit in London last week (22/23 February). Supply chain has been a major topic in the BESS industry in the past few years,
Hydrochasma: An Emerging Threat to Asia’s Medical and Shipping Industries
A new player has emerged in the realm of cyber threats: Hydrochasma. According to Symantec’s investigation, this group has set its sights on medical laboratories and shipping firms in Asia. This previously unknown group was found to have no links to any known threat actors, but it appears to be interested in industries involved in COVID-19 treatments or vaccines.
Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks
Demand forecasting (DF) plays an essential role in supply chain management, as it provides an estimate of the goods that customers are expected to purchase in the foreseeable future. While machine learning techniques are widely used for building DF models, they also become more susceptible to data poisoning attacks. In this article, we study the vulnerability of targeted poisoning attacks for linear regression DF models, where the attacker controls the behavior of forecasting models on a specific target sample without compromising the overall forecasting performance.
Assess Your Supply Chain in Line with NIST C-SCRM
Virtual Event
Mar 1, 2023
Time: 10:00 AM – 12:30 PM ET
Location: Web Conference
Assess Your Supply Chain in Line with NIST C-SCRM
The NIST Cybersecurity-Supply Chain Risk Management guidelines released in May 2022 establish 12 coverage areas (many of which are outside traditional information security boundaries) and put a spotlight on the importance of robust, accurate evaluations as part of any supply chain security strategy.
There’s a new inflation warning for consumers coming from the supply chain
As the markets prepare for the latest consumer price index data to be released on Tuesday, logistics managers are warning of a persistent source of inflation in the supply chain and saying consumers should be ready for the effect it will have on their wallets.