Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » 5 in 6 Firms at Risk from Supply Chains
Uncategorized

5 in 6 Firms at Risk from Supply Chains

Staff WriterBy Staff WriterJune 27, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


SecurityScorecard released its 2025 Supply Chain Cybersecurity Trends Survey, revealing that 88% of cybersecurity leaders are concerned about supply chain cyber risks. Based on insights from nearly 550 CISOs and security professionals worldwide, the findings reveal that the way most organizations manage supply chain cyber risk isn’t keeping pace with expanding threats.

Third-party involvement in breaches has doubled, rising from 15% to nearly 30%, according to the 2025 Verizon Data Breach Investigations Report. A small group of third-party providers now supports much of the world’s technology and infrastructure, creating an extreme concentration of risk. When even one of these providers is compromised, the ripple effects can disrupt thousands of organizations simultaneously. Attackers understand this leverage, making the supply chain an increasingly attractive entry point. Each vendor relationship expands the potential attack surface. The asymmetry is stark: defenders must secure every connection across their third- and nth-party networks, while attackers need only exploit a single vulnerability to gain access.

Cyber Technology Insights : European Cybersecurity Leader Heimdal Partners with Montreal’s Fusion Cyber Group 

Ryan Sherstobitoff, Field Chief Threat Intelligence Officer at SecurityScorecard, said: “Supply chain cyberattacks are no longer isolated incidents; they’re a daily reality. Yet breaches persist because third-party risk management remains largely passive, focused on assessments and compliance checklists rather than action. This outdated approach fails to operationalize the insights it gathers. What’s needed is a shift to active defense: supply chain incident response capabilities that close the gap between third-party risk teams and security operations centers, turning continuous monitoring and threat intelligence into real-time action. Static checks won’t stop dynamic threats—only integrated detection and response will.”

Key Findings:

More than 70% of organizations report experiencing at least one material third-party cybersecurity incident in the past year, and 5% suffered ten or more incidents.

Fewer than half of organizations monitor cybersecurity across even 50% of their nth-party supply chains, and 79% say that less than half of their nth-party supply chain is currently covered by cybersecurity programs.

Only 26% of organizations incorporate incident response into their supply chain cybersecurity programs. The majority rely on point-in-time, vendor-supplied assessments or cyber insurance.

88% of respondents say they are concerned about supply chain cybersecurity risks.

Nearly 40% of respondents cite data overload and the inability to prioritize issues and threats as their biggest supply chain cybersecurity challenge.

Cyber Technology Insights : Lumu 2025 Report Reveals Top Trends in Evasion, Malware, and Phishing Attack Vectors

Cybersecurity Recommendations for Managing Supply Chain Cyber Risk

Based on the survey findings, the SecurityScorecard offers these targeted recommendations for security teams:

Integrate Threat Intelligence Across Vendor Ecosystems: To stay ahead of active campaigns targeting the supply chain, organizations should connect threat intelligence feeds to their vendor risk management workflows. This integration enables teams to identify threats like ransomware or zero-day exploits in real time and assess their potential impact on the broader ecosystem.

Establish a Dedicated Supply Chain Incident Response Workflow: Organizations should define roles, responsibilities and communication pathways across teams to ensure that risks identified in the supply chain are resolved quickly and consistently. These processes should be regularly tested and refined as part of a broader incident response strategy.

Implement Vendor Tiering: Not all vendors or risks carry equal weight. Security teams should prioritize based on potential business impact, likelihood of exploitation and criticality to operations. Mapping the supply chain to identify high-risk dependencies and single points of failure allows for more strategic allocation of resources and focused risk mitigation efforts.

Foster a Culture of Shared Accountability and Resilience: Supply chain cybersecurity isn’t just a risk or IT issue. It requires collaboration across procurement, legal, operations and leadership. Embed security into decision-making processes, align on resilience goals and ensure teams are educated and measured against clear, shared metrics.

Cyber Technology Insights : MSI Launches Cyber Insurance Program for Managed Care Organizations

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: businesswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCitrixBleed 2 Vulnerability: Evidence of Widespread Exploitation
Next Article Cyber Eagle and Vatican Cyber Volunteers Join Forces
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

September 19, 2025

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025
Leave A Reply Cancel Reply

Latest Posts

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026
Don't Miss

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

By Staff WriterSeptember 19, 2025

Essential Insights Launch of RiskRubric.ai: The Cloud Security Alliance and partners have introduced RiskRubric.ai, the…

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Buhlmann Group Faces Devastating Ransomware Attack
  • Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses
  • Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems
  • Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows
  • DragonForce Ransomware Strikes: Critical Business Data at Risk
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.