IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Overlaid images of buildings, a sign saying 'security breach', and yellow text saying 'we have detected a harmful attack attempt'
whitepaper

Provided by

HP Wolf logo

FREE DOWNLOAD

IT supply chain security is undergoing closer scrutiny as state and local government IT leaders grapple with ransomware, discover new vulnerabilities, and confront the possibility of another SolarWinds type of attack.

In the SolarWinds attack, an update in software created a backdoor for cybercriminals to enter systems and silently wreak havoc in many private sector firms as well as federal, state and local agencies. The massive attack is still under investigation, and recent reports indicate the perpetrators may have also turned cloud platforms and other vendors’ products into potential attack vectors. 

This whitepaper highlights practices that can help organisations strengthen the integrity, security, and resilience of their IT supply chain.

.

Recommended

Protecting healthcare from cybercrime
Whitepaper

Protecting healthcare from cybercrime

25 May 2022
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

18 May 2022
The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022

Most Popular

Europe's first autonomous petrol station opens in Lisbon
automation

Europe's first autonomous petrol station opens in Lisbon

23 May 2022
Nvidia pauses hiring to help cope with inflation
Careers & training

Nvidia pauses hiring to help cope with inflation

23 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

24 May 2022
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022