Get a Pentest and security assessment of your IT network.

News

Securing the ‘Shadow Supplier’

Security expert Hugh Thompson sees a new component of the supply chain, “Shadow Supplier” He says the technology provided by the business is usually the worst technology you have; you have a worse experience at work than you do at home. Thompson: Organizations must be more agile in developing policies and adopting controls because there are too many choices in the marketplace. Some members of Congress contend the Chinese government could use the hardware to pilfer intellectual property or top-secret plans from corporate and government computers [see House Panel: 2 Chinese firms Pose IT Security Risks].”]

Source: https://www.cuinfosecurity.com/blogs/securing-shadow-supplier-p-1470

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months