Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsSpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats
SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats
Cybersecurity

SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats

•January 14, 2026
0
CSO Online
CSO Online•Jan 14, 2026

Companies Mentioned

SpyCloud

SpyCloud

Verizon

Verizon

VZ

Why It Matters

By turning opaque vendor exposures into actionable intelligence, organizations can pre‑empt supply‑chain compromises that threaten both business continuity and national security.

Key Takeaways

  • •Third‑party breaches rose to 30% in 2025.
  • •Solution uses real‑time darknet‑derived identity data.
  • •Identity Threat Index quantifies vendor risk continuously.
  • •Over 11,000 dark‑web credentials exposed for top DIB suppliers.
  • •Enables proactive vendor remediation within existing security console.

Pulse Analysis

Supply‑chain risk has become a top priority for security leaders as third‑party involvement in data breaches doubled to 30% in 2025. Traditional vendor‑risk programs rely on questionnaires, static scores, and surface‑level scans, which often miss active credential theft and malware infections. Without real‑time insight, organizations are forced to accept unknown exposure, leaving critical applications vulnerable to adversaries who exploit compromised supplier accounts.

SpyCloud’s new solution tackles this blind spot by ingesting billions of data points from recaptured breaches, malware‑infected devices, successful phishing campaigns and dark‑web listings. The resulting Identity Threat Index aggregates these signals, weighting recency, volume and severity to produce a continuously refreshed risk score for each supplier. Features such as Compromised Applications detection and actionable evidence sharing empower security, GRC and vendor‑management teams to prioritize remediation, streamline due‑diligence, and communicate concrete findings to partners, turning vendor relationships from adversarial assessments into collaborative defenses.

For enterprises and government agencies alike, the shift from passive risk acceptance to proactive identity threat protection reshapes the supply‑chain security posture. Real‑time visibility enables faster incident response, reduces the likelihood of credential‑based attacks on critical infrastructure, and supports evidence‑based procurement decisions. As cybercriminals increasingly target the extended workforce, solutions that fuse underground threat intelligence with integrated response workflows will become essential for maintaining resilience and safeguarding national‑level assets.

SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...