Supply Chain Cyberthreats Balloon in 2018

Particularly in the electronics supply chain, intellectual property and product designs are the lifeblood of the organization—and a potentially lucrative draw for cybercriminals.  Looking for “quick bucks with minimal effort,” has put the supply chain in the crosshairs of cyber miscreants, according latest Symantec Internet Security Threat Report. “Cybercriminals are testing and finding successful new attack strategies…

Insiders Pose Supply Chain’s Biggest Threat

The recent reports on the malicious infiltration into U.S. companies by the addition of a small chip on a motherboard exposed in alarming fashion how hackers are bypassing software security and are turning to hardware to gain access to and manipulate code, including at the operating system level. While these claims have been vehemently denied,…

Software Supply Chain Risk Management: Enabling Resilience in National Critical Infrastructure

Growing concerns related to dependencies on software-reliant information communications technology (ICT) and Internet of Things (IoT) devices are pushing changes in governance associated with supply chain risk management (SCRM). The possibility of disruption of critical infrastructure exists because the software that enables these capabilities is vulnerable and exploitable. Exploit potential is often more about the…

Supply Chain & Cybersecurity: Hackers Take Aim

Cybersecurity has garnered a lot of attention as hacked political elections and take-downs of e-commerce sites fill the headlines. Global electronic manufacturers, though, are at greater risk than ever before and may be at the top of the hit list for many cyber-criminals, espionage and hacktivist groups looking for an opportunity to disrupt key business…

Cyberattacks on American Factories Are Real

It’s been eight years since the widely publicized Stuxnet virus was released to wreak havoc on its unsuspecting victims. Are we in a better place now to deal with a highly sophisticated next-generation Stuxnet-style attack? Most experts say no. In fact, studies suggest that manufacturers, in particular, are increasingly vulnerable to cyberattacks. While information-heavy companies…

Data Security, Trust & Privacy Get MWC Nod

Walk the cavernous halls of this year’s Mobile World Conference and all sorts of sexy devices catch your eye. Sure, there are new, glitzy smartphones, lots of them, like every year. But there are also all these Internet of Things waiting to be noticed–a flying taxi, drones, all sorts of augmented reality demonstrations, eye blink…

Fighting the Data Breach Epidemic

Data breaches are a worldwide epidemic. Consider those that are most affected: two-thirds of Americans (198 million); half of Filipinos (55 million) and half of South Africans (30 million).  This reflects a sorry state of security in information technology (IT). As an industry, we have failed to adequately secure people’s data. The supply chain, which…

More Connected Means More Vulnerable

The Internet of Things (IoT) has gone from aspirational to actual in many ways, with 2017 promising solid growth in both chip sales and platform development. It promises always evolving applications in both consumer and business applications, from smart homes and smart cities to smart factories and smart transportation. However, the reality of IoT brings…