Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Digital Transformation

Cyber Threats and the Supply Chain: 190 Identified by CISA

by Jackie Davis
October 7, 2019
in Digital Transformation
Reading Time: 2 mins read
A A
Cyber Threats and the Supply Chain: 190 Identified by CISA
Share on FacebookShare on Twitter

When government agencies begin a discussion on cybersecurity, the focus usually turns to insider threats and malicious attacks, but other risks could compromise security – 190 supply chain risks to be exact. The Cybersecurity and Infrastructure Security Agency recently released a list of recommendations for agencies to follow to secure their tech supply chain.

The report offers agencies 11 factors that should be considered to determine whether a vendor is safe to use, saying federal agencies should only purchase equipment from “original manufacturers or their authorized resellers.”

Recently, DoorDash experienced a supply chain-based data breach that compromised the information of over 4.9 million customers. Similar attacks that affect physical addresses, names, and email addresses could be targeted at government agencies.

“The DoorDash breach highlights the inherent risks in trusting your supply chain partners. It’s critical not only to hold suppliers accountable for meeting minimum data security standards, but also to require transparency and disclosure when incidents occur,” said Mark Orlando, CTO of Cyber Protection Solutions, Raytheon Intelligence, Information and Services.

With breaches becoming a more frequent occurrence, it’s important for agency leaders to take stock of their supply chain partners and vet them for security risks. “This breach is just one more example of how little control end users have over their data once they give it to a vendor or service provider. In the new app economy, vendors routinely outsource business functions in ways that aren’t obvious (or even visible at all) to the end-user,” said Orlando. “Obviously there is much more work to be done to enforce minimum standards for safeguarding payment data and other sensitive personal information.”

CISA officials say the report contains different supply chain threats that can’t be released due to “its sensitive nature.” However, the report does identify multiple supply chain risks that agencies could face today – a valuable resource for leaders that need to evaluate their security hygiene.

Tags: CISAcybersecuritydata breachDoorDashNational Cybersecurity Awareness MonthNSCAMRaytheon

RELATED POSTS

Human Vulnerabilities
Cybersecurity

Human Vulnerabilities are at the Heart of Social Engineering Attacks

March 9, 2023
Contributed Articles

Silent But Deadly: The Cybersecurity Risks of Quiet Quitting

March 9, 2023
collaborating on cybersecurity
Cybersecurity

Collaborating on Cybersecurity Best Practices Enables Federal Agencies to Combat Global Threats

March 8, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9396 shares
    Share 3758 Tweet 2349
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    20 shares
    Share 8 Tweet 5
  • Why the Government Needs a Cloud-Native Workforce

    10 shares
    Share 4 Tweet 3
  • The Five Pillars of Zero Trust Architecture

    435 shares
    Share 174 Tweet 109

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us