Permalink to: A Challenge To Traditional Supply Chain Risk Management Programs

CERT-LatestNews ThreatsActivists ThreatsCybercrime ThreatsEconomic
Traditionally, IT and acquisition leaders have thought about their cyberattack surface in terms of physical IT assets, such as laptops, servers and networks. But there’s an important class of assets that don’t fit into that traditional management framework – such as IP addresses, domain names and....