Financial Sector Supply Chain Risk

By |2019-07-03T14:45:07-04:00February 19th, 2019|Enterprise, Finance, Information Security, Supply Chain|

Nearly 40% of all cybersecurity breaches occur in the financial services sector. Cyber attacks range from distributed denial-of-service (DDoS) attacks, corporate account takeovers (CATO) and hacking via web applications. These attacks can result in significant losses in both revenue and corporate reputations for banks, asset managers, brokerage houses and insurance companies. The data managed [...]

Cyber Concerns For The Satellite Sector

By |2019-04-30T11:59:34-04:00January 18th, 2019|Enterprise, Government, Information Security, Supply Chain|

According to the Index of Objects Launched into Outer Space maintained by the United Nations Office for Outer Space Affairs (UNOOSA), as of mid-2018 there were 792 communications satellites orbiting the earth and several hundreds of others used for navigation, technology development, space science, earth science and earth observation. Satellite systems are critically important to [...]

Cyber Threats In The Banking Industry

By |2019-04-30T11:59:48-04:00January 14th, 2019|Enterprise, Finance, Information Security, Supply Chain|

Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. In mid-2018, ITSP Magazine reported that financial services firms fall victim to cybersecurity attacks 300 times more frequently than businesses in other industries. Security breaches lead to lost revenue for a banking institutions, interruptions in [...]

Software Supply Chain Threats Are On The Rise

By |2019-04-30T11:57:18-04:00December 27th, 2018|Enterprise, Information Security, Supply Chain|

Large organizations in both the public and private sector routinely work with subcontractors for everything from the supply of manufactured components to the supply of custom computer code. For example, government agencies may contract with software development companies for the supply of code used in U.S. defense systems. In some cases, a software supplier may [...]

Is The Supply Chain The New Cyber Abyss?

By |2019-04-30T12:01:24-04:00December 3rd, 2018|Enterprise, Government, Information Security, Military, Supply Chain|

We all know that Target lost its CEO along with $164M dollars when a small HVAC contractor that was part of the supply chain was breached, allowing hackers into Target’s network. However, you may not be aware that banks spent over $200M reissuing Target credit cards. And, what about Chinese telecom equipment manufacturers ZTE and [...]

Protecting The Manufacturing Sector From Cybercrime

By |2019-04-30T12:01:59-04:00November 14th, 2018|Enterprise, Information Security, Supply Chain|

Cyber attacks in the manufacturing sector are becoming more and more prevalent. The damage is often in the form of a data breach, disruption of operations or compromise to key systems such as the company’s enterprise resource planning system (ERP). According to a 2018 Data Breach Investigations Report by Verizon, more than 30% of data [...]

The Threat Of Cybercrime For State And Local Transportation Systems

By |2019-04-30T12:02:31-04:00November 5th, 2018|Government, Information Security, Supply Chain|

In two separate ransomware attacks earlier this year, cyber criminals disrupted operations at the Colorado Department of Transportation (CODOT) for several weeks. In this case, the damage was not as detrimental as it could have been but it still begs the question: are the defenses of our local and state transportation systems sufficiently protected to [...]

Law Firms Must Close The Gap On Cybersecurity Risk

By |2019-04-30T12:09:28-04:00June 26th, 2018|Enterprise, Information Security, Legal, Privacy, Supply Chain|

According to the American Bar Association’s (ABA) 2017 Legal Technology Survey Report, 22% of respondents indicated that their law firms had suffered a data breach at some time - up from 14% in the prior year. This comes as no surprise given the access that attorneys have to a very wide range of sensitive client [...]