Tag: Supply Chain Attacks

February 14, 2022

7 Risks Posed by Open-Source Software and How to Defend Yourself

Elizabeth Fichtner

Knowing the risks posed by open-source software — going into the development process — will help you avoid pitfalls associated with sharing crowd-sourced code.

Read Now
November 17, 2021

Strong Supply Chain Security Starts with Secure Software

Emilyann Fogarty

In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.

Read Now
May 12, 2021

Four Essential Components of Third-Party Risk Management

Jaime Arze

Security considerations do not stop at the perimeter of our networks. We must take into account the posture of vendors who process our data, integrate with our systems, or those who we rely on in our day-to-day operations.

Read Now
October 21, 2019

What Is A SIM Port Hack?

Tobias Geisler Mesevage

A SIM port hack involves a hacker who has convinced your mobile phone carrier to activate your phone number on another device.

Read Now
June 18, 2019

What Is 2FA?

Tobias Geisler Mesevage

Two-factor authentication is a security procedure where a user is required to provide two different authentication factors to verify their identity.

Read Now