Breaking
March 13, 2025

The critical need for watertight security across the IT supply chain | usagoldmines.com

Cybercrime continues to be a major global concern. Cybercriminals are using ever more sophisticated approaches and exploiting every possible means to intercept valuable data or disrupt IT systems. Organizations targeted and impacted by these attacks, including businesses, critical entities, governments and entire economies are being left facing serious financial consequences and operational disarray. According to estimates from Statista’s Market Insights, the global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.

One channel used by hackers that is fast becoming a key concern is the IT supply chain. Cybercriminals are exploiting vulnerabilities at third parties of an organization’s supply chain such as vendors, suppliers and logistics and transportation companies in order to infiltrate the organization’s IT systems or access physical components destined to be implemented in products. Speculation that the recent device attacks in Lebanon were the result of third-party tampering highlights the crucial need to better secure not only software supply chains but also hardware. But how much of a threat does the IT supply chain really pose and what can be done to minimize the risks?

The weakest link

The SolarWinds cyberattack in 2020 which compromised the systems, data, and networks of thousands of organizations including the US government is the most notorious example of a wide-scale software supply chain attack. But despite the exposure of the case and acknowledgement of the need to address the issue of securing the supply chain, there have been numerous others. These include attacks on Okta, Norton, 3CX, JetBrains, Airbus and Microsoft, all of which have been equally crippling to the enterprises affected. Since 2021, cyberattacks targeting supply chains have surged 431%, according to a report published last year by insurance provider Cowbell. And industry analysts see little signs of the issue abating; Gartner predicts that the costs from these attacks will rise from $46 billion in 2023 to $138 billion by 2031.

For organizations and enterprises, the threat of exposure to attack through the supply chain is a major cause for concern. Unlike the full visibility and control they have over their own systems, to date organizations have had little reassurance that their suppliers and partners have implemented the same high standards of security. Indeed, a recent white paper published by Reuters and Cargowise, highlighted how 94% of supply chain executives were concerned about vulnerabilities in their technology stack, with 24% very or extremely concerned.

Regulators seek to bring standardized security to the supply chain

Such is the concern around the threat posed by the IT supply chain that authorities are starting to bring in regulation to curb the number of incidents. In October this year the new EU Network and Information Security version 2 (NIS2) Directive came into force. This new legislation was brought in to establish a uniform and improved level of cybersecurity across European Union countries. Critically, along with organizations operating in sectors such as public administrations, transport, energy, health and banking, companies supplying goods or part of IT supply chains must also adhere to NIS2.

NIS2 will surely help to raise greater awareness of the need to secure network infrastructure and ensure security measures are adhered to throughout the IT supply chain. However, beyond compliance with the new ruling, organizations and technology providers ultimately need to take responsibility for ensuring their prized data – and that of their customers – has the highest level of protection against theft or system attack. But how do they go about this?

Mitigating the risk of attack via the supply chain

Each enterprise or organization has its own unique supply chain composed of relevant third parties required to bring its specific solutions or services to market. As such there is no ‘one way’ of securing the supply chain, however there are measures that all enterprises should undertake to ensure their supply chains – both for software and physical components or products – are as watertight as possible, these include:

Screening suppliers: before selecting suppliers, comprehensive vetting should be undertaken to verify security practices and ensure trustworthiness Periodic audits: Carrying out regular audits and checks on supply chain partners will ensure they are maintaining the expected security measures SLAs: Implementing contractual security requirements with logistics providers to ensure they have appropriate security measures in place such as tamper-proof seals on trucks Monitoring status of goods in transit: Technologies such as RFID and AI can help to track the location and status of goods throughout the logistics flow.

The use of Gen AI to better monitor location of hardware during transit

The integration of Gen AI into logistics operations is proving not only to make IT hardware supply chains more effective, but also more significantly more secure. Thanks to its ability to extract data, process and structure unstructured data, like emails, it provides an unprecedented level of visibility into the flow of goods, tracking both their location and ownership at every stage.

The integration of Gen AI means that logistics teams are always aware of where shipments are, who is responsible for them, and can quickly respond to potential security threats even before an incident occurs. This level of insight and control is invaluable for organizations seeking peace of mind that all elements in their supply chain are well protected at every stage of production and transfer and that they do not pose any risk of being intercepted or tampered with.

As cybercrime continues to evolve in sophistication and scope, the threat posed by vulnerabilities within the IT supply chain cannot be overlooked. Organizations must confront the reality that their security will only ever be as strong as the weakest link in their supply chain. New regulations such as NIS2 will be critical to ensuring an adequate and standardized approach to security across the supply chain. However, for their own peace of mind and to ensure the integrity of their products and safeguard their valuable data, organizations should look to diligently select supply chain partners, create a culture of transparency and use advanced technologies to ensure accurate tracking and monitoring of sourced components and products. In light of the unrelenting levels of cybercrime today, investing in supply chain security and resilience in order to protect themselves from attack is a relatively small price to pay.

We’ve featured the best business VPN.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Best Chromebooks 2025: Best overall, best battery life, and more | usagoldmines.com

Best monitors 2025: Gaming, 4K, HDR, and more | usagoldmines.com

Why You Might Want to Avoid the Latest Chromecast Update Jake Peterson | usagoldmines.com

Whoop Can Now Estimate Your VO2 Max Beth Skwarecki | usagoldmines.com

OpenAI Calls on U.S. Government to Let It Freely Use Copyrighted Material for AI Training Juli Clove...

AI server designed for Chinese military use wins major global design award in Europe waynewilliams@o...

‘Podcasting shouldn’t be locked behind walled gardens’: Pocket Casts slams Spotify and makes its web...

The FCC is creating a security council to bolster US defenses against cyberattacks | usagoldmines.c...

Toyota's self-charging concept EV could help you tackle the daily commute on solar power alone | us...

Google has a fix for your broken Chromecast V2 unless you factory reset Ryan Whitwam | usagoldmines....

Popular program to promote women becoming aerospace engineers is at risk Eric Berger | usagoldmines....

Fortnite is coming to Snapdragon PCs: ‘We’re all in on PC gaming’ | usagoldmines.com

Android 16 Beta 3 Available for Pixel Devices Kellen | usagoldmines.com

Google Pushes Initial Fix for Chromecast 2nd Gen and Audio Outage Kellen | usagoldmines.com

A New 'Add to Calendar' Button Is Coming to Gmail Khamosh Pathak | usagoldmines.com

This 2020 M1 MacBook Air Is Over $500 Off Right Now Pradershika Sharma | usagoldmines.com

Mac Mini vs. Mac Studio Buyer's Guide: 20+ Differences Compared Hartley Charlton | usagoldmines.com

Forget AI – WhatsApp is planning a simple messages feature that could be its most useful upgrade in ...

Microsoft uncovers sleuthy new XCSSET MacOS malware campaign | usagoldmines.com

Have we accidentally bred some dogs for obesity? Jacek Krywko | usagoldmines.com

Meta plans to test and tinker with X’s community notes algorithm Ashley Belanger | usagoldmines.com

Windows 11 bug with Nvidia GPUs prevents apps from launching | usagoldmines.com

Eufy FamiLock S3 Max review: Lock, stock, and onboard video | usagoldmines.com

Gemini Connects to More Apps, Like Google Tasks and Photos Tim | usagoldmines.com

Galaxy S23 Family Gets One UI 7 Beta Access Tim | usagoldmines.com

T-Mobile Continues Raising Prices on Older Plans, Up to $5 Per Line Kellen | usagoldmines.com

Google Has Dropped the Paywall for These Gemini Features Khamosh Pathak | usagoldmines.com

You Need Update Firefox Before Friday Jake Peterson | usagoldmines.com

Kuo: Apple Knows Apple Intelligence is 'Underwhelming' and Won't Drive iPhone Upgrades Juli Clover |...

Get ready for a bounty of PC games on June 8, as the PC Gaming show is back | usagoldmines.com

I cloned my voice in seconds using a free AI app, and we really need to talk about speech synthesis ...

Google’s Gemini AI can now see your search history Ryan Whitwam | usagoldmines.com

Best ultrawide monitors 2025: Picks for gaming, budget, 5K, premium, and more | usagoldmines.com

Best VPN for streaming Netflix 2025: Watch from wherever you are | usagoldmines.com

I’m trying to replace my Apple TV with a home theater PC | usagoldmines.com

Kensington’s new Expert Mouse trackball looks great, but availability is uncertain | usagoldmines.c...

Slip this tracker in your wallet and never lose it again, now 30% off | usagoldmines.com

Anker’s fast-charging USB wall plug for 3 devices is 37% off right now | usagoldmines.com

Google Play Games on PC Gets Major Upgrades, More Games, New Play Points Bonuses Kellen | usagoldmin...

Google’s Gemini Gets “Personalization” Using Your Search History If You Are Cool With That Kellen | ...

My Favorite Method for Scrambling Eggs Isn't What I Predicted Allie Chanthorn Reinmann | usagoldmine...

You Can Use the Windows App to Acess Your PC Remotely or in the Cloud David Nield | usagoldmines.com

Netflix might be renewing The Perfect Couple and Beauty in Black for season 2, but I don’t get why w...

The new NordicTrack Ultra 1 treadmill looks like it was designed by an architect and costs $15,000 s...

I made an AI version of Bilbo Baggins using Goggle Gemini for free, and shared a pipe with him outsi...

Gemini Deep Research just got even smarter and it’s now free for everyone to try - here's why you sh...

Google just gave Gemini a superpower by allowing it to access your Search history - here's why I'm e...

Meta warns of worrying security flaw hitting open source type software | usagoldmines.com

Ubisoft shareholder accuses publisher of 'misleading investors', plans protest outside Paris HQ | u...

Nvidia RTX 5080 stock is so barren that retailers are holding competitions where you can "win" the r...

Biometrics add another layer of security to passwordless authentication | usagoldmines.com

Microsoft’s new AI “Copilot for Gaming” struggles to justify its existence Kyle Orland | usagoldmine...

AI coding assistant refuses to write code, tells user to learn programming instead Benj Edwards | us...

Google is bringing every Android game to Windows in big gaming update Ryan Whitwam | usagoldmines.co...

OpenAI urges Trump: Either settle AI copyright debate or lose AI race to China Ashley Belanger | usa...

Amazon Spring Sale 2025: What to expect and best early deals | usagoldmines.com

HP’s latest firmware update breaks printers using HP’s own toner | usagoldmines.com

Corsair Platform:4 review: A modular desk with powerful features | usagoldmines.com

Wow! Samsung’s 34-inch 1440p OLED ultrawide monitor is $520 off | usagoldmines.com

You Can Get a Lifetime Subscription to Babbel on Sale for $129 Right Now Pradershika Sharma | usagol...

Amazon Takes Up to $450 Off M4 MacBook Pro, Available From $1,399 Mitchel Broussard | usagoldmines.c...

Apple Music Classical Now Available on the Web Joe Rossignol | usagoldmines.com

Microsoft warns about a new phishing campaign impersonating Booking.com | usagoldmines.com

Latest Dune Awakening trailer provides a deeper look at open-world exploration on the planet Arrakis...

Microsoft confirms Copilot can be tested by Xbox Insiders next month and shares new details about ho...

'We're optimists': AI enthusiasts Joe and Anthony Russo defend its use in movies and TV shows, but a...

The new Apple MacBook Air M4 has a weird quirk with its performance cores - but it's nothing to worr...

40% of IT leaders scared to admit mistakes due to workplace culture of fear | usagoldmines.com

The EPA is scrapping fuel economy regs, claiming it will bring back US jobs Jonathan M. Gitlin | usa...

Trump’s EPA clearly shows it doesn’t understand the assignment Marianne Lavelle and Phil McKenna, In...

Epic Games is addressing one of Windows-on-Arm’s last big app compatibility gaps Andrew Cunningham |...

5 creative ways to use a PC video capture card | usagoldmines.com

Printers are spitting out nonsense after a borked Windows update | usagoldmines.com

You Should Spring Clean Your Finances Too Meredith Dietz | usagoldmines.com

This Highly Rated 75-Inch 4K ULED TV Is Under $500 Right Now Pradershika Sharma | usagoldmines.com

Amtrak's Redesigned iPhone App Offers Easier Access to Train Status, Tickets, and More Joe Rossignol...

Emily in Paris season 5: everything we know so far about the hit Netflix show’s return | usagoldmin...

Thousands of iOS apps found to expose user data and leak Stripe keys | usagoldmines.com

Sonos reportedly cancels its streaming video player, but I hope it resurrects one part of it, becaus...

Windows survival skills: 8 things every PC user should know how to do | usagoldmines.com

Acer Chromebook Plus Spin 514 review: This 2-in-1 nearly nails it | usagoldmines.com

How ChatGPT coached me to email greatness | usagoldmines.com

My Favorite Recipes to Get the Most Out of Your Dutch Oven Allie Chanthorn Reinmann | usagoldmines.c...

What You Actually Need to Know About Measles and the MMR Vaccine Beth Skwarecki | usagoldmines.com

Apple Announced Swift Assist at WWDC 2024... So Where Is It? Tim Hardwick | usagoldmines.com

Invincible season 3 ending explained: is [spoiler] dead, Damien Darkblood end credits scene, will th...

Intel reveals its new CEO | usagoldmines.com

AMD's most powerful processor ever actually runs better on Windows 10 than Windows 11 alekshamclough...

Hacked Tata Technologies data leaked by ransomware gang | usagoldmines.com

No, your printer isn't possessed: a Windows 11 23H2 bug could be making it print random characters w...

Actually, yes, Assassin's Creed Shadows will be playable on Steam Deck at launch, Ubisoft confirms ...

Why effective cybersecurity is a team effort | usagoldmines.com

The Samsung Galaxy Z Fold 7 could be in line for a Galaxy S25 Ultra-level camera upgrade | usagoldm...

The Taylor Sheridan supremacy lives on at Paramount+ as Landman gets renewed for season 2 grace.morr...

Samsung tipped to unveil first-ever bone-conduction headphones at Galaxy Z Fold 7 event stephen.warw...

The newly revealed Inzoi system requirements are enough to make me go back to The Sims 4 dash.wood@f...

iOS 18.4 will give your iPhone a much-needed maps upgrade – but only if you're in the EU alexblake.t...

The latest iPhone 17 Pro Max leak may have given us another look at its upcoming redesign | usagold...

This Redditor installed a game engine on their smartwatch, and now it runs Doom, Quake, and Half-Lif...

Today’s Steam Spring Sale features my absolute favorite game of all time - here's when the sale star...

Leave a Reply