A new player has emerged in the realm of cyber threats: Hydrochasma. According to Symantec’s investigation, this group has set its sights on medical laboratories and shipping firms in Asia. This previously unknown group was found to have no links to any known threat actors, but it appears to be interested in industries involved in COVID-19 treatments or vaccines.
Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks
Demand forecasting (DF) plays an essential role in supply chain management, as it provides an estimate of the goods that customers are expected to purchase in the foreseeable future. While machine learning techniques are widely used for building DF models, they also become more susceptible to data poisoning attacks. In this article, we study the vulnerability of targeted poisoning attacks for linear regression DF models, where the attacker controls the behavior of forecasting models on a specific target sample without compromising the overall forecasting performance.
Assess Your Supply Chain in Line with NIST C-SCRM
Virtual Event
Mar 1, 2023
Time: 10:00 AM – 12:30 PM ET
Location: Web Conference
Assess Your Supply Chain in Line with NIST C-SCRM
The NIST Cybersecurity-Supply Chain Risk Management guidelines released in May 2022 establish 12 coverage areas (many of which are outside traditional information security boundaries) and put a spotlight on the importance of robust, accurate evaluations as part of any supply chain security strategy.
There’s a new inflation warning for consumers coming from the supply chain
As the markets prepare for the latest consumer price index data to be released on Tuesday, logistics managers are warning of a persistent source of inflation in the supply chain and saying consumers should be ready for the effect it will have on their wallets.
US will see more new battery capacity than natural gas generation in 2023
Earlier this week, the US’ Energy Information Agency (EIA) gave a preview of the changes the nation’s electrical grid is likely to see over the coming year. The data is based on information submitted to the Department of Energy by utilities and power plant owners, who are asked to estimate when generating facilities that are planned or under construction will come online. Using that information, the EIA estimates the total new capacity expected to be activated over the coming year.
Mature Your Zero Trust Program: Use Cases for 2023
Virtual Event -Feb 22 2023
Time -10:00 AM – 12:30 PM CT
Location-Web Conference
Applying zero trust architectures in an iterative way – one project at a time – has proven a sustainable method to deepen zero trust capabilities across a program. This symposium covers popular zero trust use cases for 2023 to accelerate your organization’s zero trust maturation.
Manufacturer’s Contexts, Supply Chain Risk Management, and Agility Performance
he dynamism of the current business environment emanates significant challenges and disruption risks for supply chains. These vulnerabilities in contemporary supply chains have motivated a substantial academic focus on supply chain risk management (SCRM). In the empirical literature on SCRM, a firm’s external environment is conceptualized as a source of risk, and various organizational and technological factors are discussed as influencers of SCRM.
Critical Manufacturing Organizations Face Significant Risk of Cyber Attacks
Recent years have seen an alarming increase in the number of cyberattacks against critical infrastructure, many of which involved ransomware. Particularly in terms of cyber resilience, the industrial industry appears to be falling behind.
SUPPLY CHAIN SECURITY: 98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis
The digital supply chain is probably more extensive and more complicated than you realize. Upward of 98% of organizations have a relationship with at least one third party that has experienced a breach in the last two years – and these figures are almost certainly no exaggeration.
Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software
Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months after three security vulnerabilities were brought to light in the same product. Firmware security firm Eclypsium said the two shortcomings were held back until now to provide AMI additional time to engineer appropriate mitigations.