Supply Chain Security

Stories on preventing supply chain attacks by Teri Radichel

Teri Radichel
Cloud Security
Published in
3 min readAug 17, 2023

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: Cybersecurity | Appsec | Secure Code

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

These are a few stories I’ve written about trying to secure the supply chain. Attackers have been known to leverage vendor systems, deployment systems, third-party contractors, and open source software to get into organization systems and data. There are also geo-political forces at work with objectives such as corporate espionage or breaches of national security. These stories attempt to address some of those issues.

Software integrity and Software Bill of Materials (SBOM) are challenging topics and I hope to write about them more in the future.

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award