Page 181 - Cyber Defense eMagazine August 2024
P. 181
Ongoing supplier Ongoing monitoring of a Ongoing Used to identify the
portfolio portfolio of suppliers. relative risks of all
monitoring their suppliers.
Ongoing reporting of alerts for
emerging threats
Conclusion
When companies vet their suppliers, they often use third-party services with limited visibility, such as a
simple perimeter scan of the supplier's network. Some companies delve deeper and rely on a CTI vendor
for a more comprehensive scan. However, they usually depend on vendors who can only access TOR
and the surface web, which gives their clients incomplete visibility and often results in missing essential
issues they are concerned about. As a result, they usually miss more significant events than they
discover.
About the Author
Shawn Loveland is the COO of Resecurity. He is an experienced
professional in the technology and cybersecurity field with over 35 years
of industry expertise. He has worked for both small and large companies
and has received 15 US patents and numerous international patents in
computer security and telephony.
As the COO of Resecurity, Shawn aids Resecurity in providing practical
solutions to our clients against the current threat landscape. He conducts
proactive threat research and helps clients assess their Cyber Threat
Intelligence (CTI) programs. He also provides customized intelligence services tailored to meet their
unique needs. Before joining Resecurity, Shawn was responsible for dark web intelligence at Microsoft.
Shawn can be reached online at (Shawn Loveland | LinkedIn) and at our company website,
https://www.resecurity.com/
Cyber Defense eMagazine – August 2024 Edition 181
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.