When working in cybersecurity, there’s still risk ‘everywhere in the software supply chain’

The National Counterintelligence and Security Center (NCSC) leads counterintelligence for the national government. Among its myriad missions is securing the software supply chain.

“My directorate is certainly concerned with the supply chain of all critical infrastructure, certainly the supply chain that the IC has to source from as well,” Jeanette McMillian, assistant director of NCSC’s Supply Chain and Cyber Directorate said on Federal Monthly Insights – Securing the Supply Chain.

Read Full Article

Japan, Canada in Talks Over Collaboration in Battery Metals Supply Chain

Japan and Canada are discussing collaboration on building strong supply chains for battery metals, Japan’s industry minister, Yasutoshi Nishimura, said on Tuesday. A public-private mission led by Japan’s Ministry of Economy, Trade and Industry (METI) and including 16 companies that work with batteries visited Canada last week for talks on building sustainable and resilient supply chains, he said.

Read Full Article

Developing Supply Chain Capabilities Through Digitalization and Viability for Controlling the Ripple Effect

The COVID-19 pandemic affected all industries and presented manufacturing firms with enormous challenges, with considerable changes in consumer demand for goods and services. Supply chain management disruption caused by the COVID-19 outbreak resulted in several socio-economic roadblocks. The slow propagation of disruption risk results in a ripple effect along the entire chain. The lack of resilience and risk management capability is the prime cause, attributed to the unavailability of digital resources, skills, and knowledge. 

Read Full Publication

Cybercriminals exploit SVB collapse to steal money and data

The collapse of the Silicon Valley Bank (SVB) on March 10, 2023, has sent ripples of turbulence throughout the global financial system, but for hackers, scammers, and phishing campaigns, it’s becoming an excellent opportunity.

As multiple security researchers report, threat actors are already registering suspicious domains, conducting phishing pages, and gearing up for business email compromise (BEC) attacks.

Read Full Article

Take a Programmatic Approach to Your Zero Trust Journey

Virtual Event

Apr 20, 2023

Time: 10:00 AM – 12:30 PM ET

Location: Web Conference

Zero trust journeys typically start down one of two paths: (1) With a formal strategy to build a holistic program; or (2) tackling point projects employing zero trust principles of least privilege and least trust. This session walks through the policy and planning steps for both paths to move your zero trust transformation forward. 

Register Now

US introduces new rules to protect water systems from hackers


The US Environmental Protection Agency on Friday announced new requirements for public water facilities to boost their cybersecurity while expressing concern that many facilities have failed to take basic steps to protect themselves from hackers.

The new EPA memo requires state governments to audit the cybersecurity practices of public water systems — and then use state regulatory authorities to force water systems to add security measures if existing ones are deemed insufficient.

Read Full Article

‘No easy answer’ on managing battery storage supply chain issues, but things are getting better

Managing your battery energy storage system (BESS) supply chain is a complex issue with no easy fixes, according to leading developers, system integrators and investors. That was the message from panelists on the ‘Effective Management of Supply Chains’ on day one of Energy Storage Summit in London last week (22/23 February). Supply chain has been a major topic in the BESS industry in the past few years,

Read Full Article

Hydrochasma: An Emerging Threat to Asia’s Medical and Shipping Industries

A new player has emerged in the realm of cyber threats: Hydrochasma. According to Symantec’s investigation, this group has set its sights on medical laboratories and shipping firms in Asia. This previously unknown group was found to have no links to any known threat actors, but it appears to be interested in industries involved in COVID-19 treatments or vaccines.

Read Full Article

Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks

Demand forecasting (DF) plays an essential role in supply chain management, as it provides an estimate of the goods that customers are expected to purchase in the foreseeable future. While machine learning techniques are widely used for building DF models, they also become more susceptible to data poisoning attacks. In this article, we study the vulnerability of targeted poisoning attacks for linear regression DF models, where the attacker controls the behavior of forecasting models on a specific target sample without compromising the overall forecasting performance.

Full Publication