Organizations are changing cybersecurity providers in wake of Crowdstrike outage

More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers. T… Continue reading Organizations are changing cybersecurity providers in wake of Crowdstrike outage

NIST updates guidance for cybersecurity supply chain risk management

The National Institute of Standards and Technology (NIST) has updated its guidance document for helping organizations identify, assess and respond to cybersecurity risks throughout the supply chain. “[Cybersecurity Supply Chain Risk Management Pr… Continue reading NIST updates guidance for cybersecurity supply chain risk management

MVSP: A minimum cybersecurity baseline to simplify vendor security assessment

Any organization that’s actively working on managing its cybersecurity risk can’t ignore the risk that goes with third-party vendors having access to its critical systems and customer data. “Up until today, organizations of all sizes … Continue reading MVSP: A minimum cybersecurity baseline to simplify vendor security assessment

Tropic picks up $25M to streamline software procurement experiences

The pandemic was a catalyst for showing companies looking to cut costs, just how much they were spending on their software tools. Continue reading Tropic picks up $25M to streamline software procurement experiences

Lightyear nabs $13M Series A as online network procurement takes shape

It seems like everything is being pushed online now, but network procurement stubbornly has remained an in-person or phone-based negotiation. Lightyear, an early stage New York City startup decided to change that last year, and the company announced a $13.1 million Series A today. The round was led by Ridge Ventures with participation from Zigg […] Continue reading Lightyear nabs $13M Series A as online network procurement takes shape

How a conference room speakerphone might let attackers into your company network

Several egregious vulnerabilities affecting the Stem Audio Table conference room speakerphone could be exploited by attackers to eavesdrop on what’s being discussed in its proximity, download malicious firmware, achieve and maintain network persi… Continue reading How a conference room speakerphone might let attackers into your company network

Capital projects delayed or put on hold due to pandemic

61% of owner-operators of factories, mines, refineries and public, telecommunications and utility infrastructure organizations expect new projects to be delayed or put indefinitely on hold because of the COVID-19 pandemic, Accenture reveals. Pandemic i… Continue reading Capital projects delayed or put on hold due to pandemic

Fairmarkit lands $30M Series B to modernize procurement

As the pandemic has raged on, it has shined a spotlight on the importance of procurement, especially in certain sectors. Fairmarkit, a Boston startup, is working to bring a modern digital procurement system to the enterprise. Today, the company announced a $30 million Series B. GGV Capital and Insight Partners led the round with help […] Continue reading Fairmarkit lands $30M Series B to modernize procurement

PPE, COVID-19 Medical Supplies Targeted by BEC Scams

FBI said that government agencies aiming to buy critical items like ventilators have unknowingly transferred funds to threat actors. Continue reading PPE, COVID-19 Medical Supplies Targeted by BEC Scams

ENISA publishes procurement guidelines for cybersecurity in hospitals

The EU Agency for Cybersecurity (ENISA) published a cybersecurity procurement guide for hospitals. The hospital is a vast ecosystem comprised of an entire network of devices, equipment and systems that often require connection to external systems, maki… Continue reading ENISA publishes procurement guidelines for cybersecurity in hospitals