article thumbnail

May Firmware Threat Report

Security Boulevard

The events also became a watershed moment, one in which cyber risk to national security fully materialized. […]. The post May Firmware Threat Report appeared first on Security Boulevard. The SolarWinds and related supply chain attacks put our government through the crucible of painful incident response and restoration efforts.

article thumbnail

Third Party Cyber Risk is growing. Most Companies aren’t prepared.

The Security Ledger

Third party cyber risk is a growing concern for organizations, as breaches and hacks tied to third party providers and applications multiply. How do you know if your third party cyber risk management program is up to the task? Our new e-book, sponsored by CyberGRX, will help you figure it out! We Talk about Why.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dell new vulnerability puts over 30 million users at risk

CyberSecurity Insiders

Going with the technical terms, the vulnerability was impacting a feature called BIOS Connect that allows users to perform system recovery and update firmware by connecting the device BIOS setup with the backend servers of Dell on a remote node.

Risk 87
article thumbnail

RSA warns Digital Transformation is supercharging Digital Risk

The Security Ledger

But executives at RSA Security warn that it is also magnifying digital risk in ways that are easy to miss. Related Stories Third Party Cyber Risk is growing. Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy Huge Survey of Firmware Finds No Security Gains in 15 Years.

article thumbnail

Reducing your attack surface is more effective than playing patch-a-mole

Malwarebytes

Zyxel warned its NAS (Network Attached Storage) devices users to update their firmware to fix a critical severity command injection vulnerability. When it comes to reducing cyber risk and ensuring resilience, we all have a role to play.”

article thumbnail

Why Healthcare IoT Requires Strong Machine Identity Management

Security Boulevard

Secure IoT firmware and authenticated devices offer benefits that extend to the entire healthcare ecosystem. Weak PKI Implementation is a Major Cyber Risk. Code signing processes verify a software component is valid and authenticates the identity of the developer. To learn more, contact one of our experts. Related Posts.

article thumbnail

GrammaTech CodeSentry Enhances Software Bill of Materials Capabilities to Improve Software Supply Chain Security

CyberSecurity Insiders

“CodeSentry provides deep visibility, intelligence and actionable information into the makeup of software applications and their vulnerabilities without access to source code so enterprises, development teams and software vendors can better identify and reduce cyber risk.”. printer drivers, router firmware, etc.),