Home News The Strategic Threat to U.S. Tech Companies The Strategic Threat to U.S. Tech Companies October 15, 2018 Chinese Spies Allegedly Hacking Hardware Raises the Alarm While its veracity remains in much doubt, Bloomberg Businessweek’s cover story — of Chinese spies allegedly hacking hardware manufactured in China and used by tech giants like Apple and Amazon — has once again raised the alarm about the risk to information technology’s global supply chain. Read More Share: Facebook Twitter LinkedIn Related reading Report Central and Eastern European Report: Managing Cyber Risk Across the Extended Vendor Ecosystem May 26, 2022 This global survey provides insight into third-party cyber risk management and vendor risk management with findings from Central and Eastern Europe. Read more Ransomware Why Are the Consequences of Ransomware Attacks Rarely Fully Understood? May 24, 2022 According to BlueVoyant’s ransomware research, unsuspecting victims suffer the consequences, such as layoffs, medical treatment delays, travel… Read more Webinar Protecting the Grid: The Evolving Threat Landscape and Proactive Defense in the Energy Sector May 23, 2022 Join us on June 16 as we discuss the energy grid landscape and how the industry can address risk with a proactive approach. Register now
October 15, 2018 Chinese Spies Allegedly Hacking Hardware Raises the Alarm While its veracity remains in much doubt, Bloomberg Businessweek’s cover story — of Chinese spies allegedly hacking hardware manufactured in China and used by tech giants like Apple and Amazon — has once again raised the alarm about the risk to information technology’s global supply chain. Read More Share: Facebook Twitter LinkedIn Related reading Report Central and Eastern European Report: Managing Cyber Risk Across the Extended Vendor Ecosystem May 26, 2022 This global survey provides insight into third-party cyber risk management and vendor risk management with findings from Central and Eastern Europe. Read more Ransomware Why Are the Consequences of Ransomware Attacks Rarely Fully Understood? May 24, 2022 According to BlueVoyant’s ransomware research, unsuspecting victims suffer the consequences, such as layoffs, medical treatment delays, travel… Read more Webinar Protecting the Grid: The Evolving Threat Landscape and Proactive Defense in the Energy Sector May 23, 2022 Join us on June 16 as we discuss the energy grid landscape and how the industry can address risk with a proactive approach. Register now
Report Central and Eastern European Report: Managing Cyber Risk Across the Extended Vendor Ecosystem May 26, 2022 This global survey provides insight into third-party cyber risk management and vendor risk management with findings from Central and Eastern Europe. Read more
Ransomware Why Are the Consequences of Ransomware Attacks Rarely Fully Understood? May 24, 2022 According to BlueVoyant’s ransomware research, unsuspecting victims suffer the consequences, such as layoffs, medical treatment delays, travel… Read more
Webinar Protecting the Grid: The Evolving Threat Landscape and Proactive Defense in the Energy Sector May 23, 2022 Join us on June 16 as we discuss the energy grid landscape and how the industry can address risk with a proactive approach. Register now