Supply Chain cybersecurity refers to the measures and practices implemented to secure the interconnected network of organisations and processes involved in the production and distribution of goods and services.
Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.
Sunny Rao, SVP Asia Pacific at JFrog recently cites how Australia and New Zealand tech leaders are confronting their own ‘broken’ software supply chains.
Ask an enterprise ...
As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical ...
As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to ...
Introduction
The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most ...
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s ...
Unifying proof from GitHub, ServiceNow, Sonar, and more, JFrog AppTrust delivers a trusted single source of truth for faster, more reliable, compliant software releases
New security status enables BeyondTrust to provide assurance in helping the Australian Government reinforce cloud posture.
IRAP-assessed solutions now enable public sector ...
New capabilities within Oracle Cloud SCM help organisations streamline warehouse operations, simplify inventory transactions, and accelerate order fulfilment
Overview
Continued research by Darktrace has revealed that cryptocurrency users are being targeted by threat actors in an elaborate social engineering scheme that continues ...
“Hospitals may have stronger defences, but attackers know the weak link often lies in the smaller, less protected third-party medical providers. Medical professionals running ...
The Software Supply Chain State of the Union 2025 Report Reveals “Quad-fecta” of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, & more are Jeopardising Trust ...