A new module by Cybersixgill exposes intelligence on third-party systems
Cybersixgill's new module enriches threat intelligence with insights into specific manufacturers, enabling preemptive actions against third-party supply chain threats.
Key Points:
- Supply chain attacks, such as the SolarWinds and Kaseya incidents, constitute a major source of cyber threats and rapidly become a significant risk to organizations.
- Cybersixgill's new module for intelligence on third-party systems identifies risks to the supply chain and provides an assessment of their potential impact on the organization, including recommendations for action even before any attack occurs.
- Combined with Cybersixgill's Active Situational Management (ASM) solution, the new model strengthens organizational capabilities to overcome blind spots and take preventive measures against threats with the highest probability of occurrence.
- The module is now available to beta customers.
Cybersixgill, an international provider of cyber threat intelligence, has launched a breakthrough module providing organizations with targeted intelligence on third-party systems. It empowers information security teams with details regarding specific manufacturers, allowing them to monitor and detect potential risks posed to the environment and take preventive measures.
The new module combines intelligence on manufacturers with information about the suppliers' technological environment. This enhances the critical blind spot of information security teams. With this intelligence, analysts and information security personnel can identify threats posed to the organization from the supply chain and expand their threat management efforts.
Supply chains have become a significant cyber threat. Research shows that in 2023, there were 245,000 attacks recorded, including incidents like SolarWinds, Kaseya, and Log4J, with an accumulated damage of $46 billion, expected to rise to $60 billion in 2024. Moreover, in the first three months until April '23, 61% of businesses in the US were directly affected by attacks through the supply chain. 66% of companies stated they do not trust third-party suppliers to report significant breaches. 98% of organizations reported at least one of their software manufacturers experiencing an attack in the past two years.
Chris Stefan, Vice President of Research, Information Security, and Risk Management at Enterprise Management Associates (EMA), commented, "Cybersixgill's third-party systems intelligence module represents a significant advancement in providing actionable insights for information security teams - insights that empower and assist them in defending the organization against cyber threats. Such intelligence, which illuminates and identifies threats from third-party systems within the organization, was clearly a missing link in information security plans, and I commend the introduction of this essential solution to the market."
Gabi Reish, Vice President of Products at Cybersixgill, stated, "Information security teams can take all necessary steps to protect the organizational environment. But if they lack intelligence on the potential risks to the supply chain and their impact on organizational security, it could have catastrophic consequences for the brand and profitability. Against the steep price of supply chain attacks, our new intelligence module on third-party systems provides crucial insights for information security personnel and threat researchers to defend the organization and its network of suppliers and partners."
Jerusalem Post Store
`; document.getElementById("linkPremium").innerHTML = cont; var divWithLink = document.getElementById("premium-link"); if (divWithLink !== null && divWithLink !== 'undefined') { divWithLink.style.border = "solid 1px #cb0f3e"; divWithLink.style.textAlign = "center"; divWithLink.style.marginBottom = "15px"; divWithLink.style.marginTop = "15px"; divWithLink.style.width = "100%"; divWithLink.style.backgroundColor = "#122952"; divWithLink.style.color = "#ffffff"; divWithLink.style.lineHeight = "1.5"; } } (function (v, i) { });