Earlier this week, the US’ Energy Information Agency (EIA) gave a preview of the changes the nation’s electrical grid is likely to see over the coming year. The data is based on information submitted to the Department of Energy by utilities and power plant owners, who are asked to estimate when generating facilities that are planned or under construction will come online. Using that information, the EIA estimates the total new capacity expected to be activated over the coming year.
Mature Your Zero Trust Program: Use Cases for 2023
Virtual Event -Feb 22 2023
Time -10:00 AM – 12:30 PM CT
Location-Web Conference
Applying zero trust architectures in an iterative way – one project at a time – has proven a sustainable method to deepen zero trust capabilities across a program. This symposium covers popular zero trust use cases for 2023 to accelerate your organization’s zero trust maturation.
Manufacturer’s Contexts, Supply Chain Risk Management, and Agility Performance
he dynamism of the current business environment emanates significant challenges and disruption risks for supply chains. These vulnerabilities in contemporary supply chains have motivated a substantial academic focus on supply chain risk management (SCRM). In the empirical literature on SCRM, a firm’s external environment is conceptualized as a source of risk, and various organizational and technological factors are discussed as influencers of SCRM.
Critical Manufacturing Organizations Face Significant Risk of Cyber Attacks
Recent years have seen an alarming increase in the number of cyberattacks against critical infrastructure, many of which involved ransomware. Particularly in terms of cyber resilience, the industrial industry appears to be falling behind.
SUPPLY CHAIN SECURITY: 98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis
The digital supply chain is probably more extensive and more complicated than you realize. Upward of 98% of organizations have a relationship with at least one third party that has experienced a breach in the last two years – and these figures are almost certainly no exaggeration.
Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software
Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months after three security vulnerabilities were brought to light in the same product. Firmware security firm Eclypsium said the two shortcomings were held back until now to provide AMI additional time to engineer appropriate mitigations.
2023 VIRTUAL SYMPOSIUM
Assess Your Supply Chain in Line with NIST C-SCRM
Mar 1, 2023 Time: 10:00 AM – 12:30 PM ET
Location: Web Conference
The NIST Cybersecurity-Supply Chain Risk Management guidelines released in May 2022 establish 12 coverage areas (many of which are outside traditional information security boundaries) and put a spotlight on the importance of robust, accurate evaluations as part of any supply chain security strategy.
How Biden’s microchip ban is curbing China’s AI weapons efforts
President Joe Biden’s motorcade pulled up to a 40-acre construction site dotted with some two dozen red, blue and gold cranes. An American flag hung from one of the site’s buildings alongside a banner that read “A Future made in America: Phoenix, Arizona.”
The site will feature a new facility of the Taiwan Semiconductor Manufacturing Company. Biden had arrived to tout the company’s newly announced $40 billion investment in U.S. microelectronics manufacturing following the July enactment of the CHIPS Act, which included $52 billion in subsidies and tax incentives for businesses that produce semiconductors within the country.
2022 global smartphone shipments were the lowest in nearly a decade
The industry capped off another dismal year with a 17% year over year drop for Q4. That number puts the full year’s shipping figures 11% below 2021, per new numbers from Canalys, which refer to it as “an extremely challenging year for all vendors.”
CISA released four Industrial Control Systems (ICS) Advisories
These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations: