The Cybersecurity & Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) jointly published a new resource as part of their ongoing efforts to promote awareness of, and help organizations defend against, supply chain risks. The publication, Defending Against Software Supply Chain Attacks, provides recommendations for software customers and vendors as well as key steps for prevention, mitigation and resilience of software supply chain attacks.
Software supply chain attacks occur when a cyber threat actor infiltrates a software ...
A recently discovered security vulnerability potentially affecting at least 100 million Internet of Things (“IoT”) devices[1] highlights the importance of the newly enacted IoT Cybersecurity Improvement Act of 2020 (the “IoT Act”). Researchers at the security firms Forescout Research Labs and JSOF Research Labs have jointly published a report detailing a security vulnerability known as “NAME:WRECK.” This is exactly the type of issue that the new IoT Act was and is designed to address at the governmental level, because the vulnerability can detrimentally affect ...
Blog Editors
Recent Updates
- Video: How Modern Workplaces Navigate Generational Shifts: One-on-One with Jeff Landes
- Updated New York Retail Worker Safety Act Takes Effect Soon
- Video: Independent Contractor Rule, EEO-1 Reporting, and New York Labor Law Amendment - Employment Law This Week
- Colorado’s Historic AI Law Survives Without Delay (So Far)
- Disparate Impact Liability Under Fire