The Cybersecurity & Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) jointly published a new resource as part of their ongoing efforts to promote awareness of, and help organizations defend against, supply chain risks. The publication, Defending Against Software Supply Chain Attacks, provides recommendations for software customers and vendors as well as key steps for prevention, mitigation and resilience of software supply chain attacks.
Software supply chain attacks occur when a cyber threat actor infiltrates a software ...
A recently discovered security vulnerability potentially affecting at least 100 million Internet of Things (“IoT”) devices[1] highlights the importance of the newly enacted IoT Cybersecurity Improvement Act of 2020 (the “IoT Act”). Researchers at the security firms Forescout Research Labs and JSOF Research Labs have jointly published a report detailing a security vulnerability known as “NAME:WRECK.” This is exactly the type of issue that the new IoT Act was and is designed to address at the governmental level, because the vulnerability can detrimentally affect ...
Blog Editors
Recent Updates
- NYDFS Cybersecurity Crackdown: New Requirements Now in Force—Are You Compliant?
- Video: New Tips and Overtime Guidance, NLRB Circuit Split, and Stalled Nomination - Employment Law This Week
- Companies and Employees Increasingly at Risk of AI-Powered Cyber Attacks
- Video: New Leadership and Priorities for the EEOC - Employment Law This Week
- Expanded Pay Transparency Requirements Coming to Columbus, Ohio