Companies must get ready for a riskier world
Of all recently documented cyberbreaches, more than 60% occur through trusted vendors whose computer systems have been compromised by hackers.
Of all recently documented cyberbreaches, more than 60% occur through trusted vendors whose computer systems have been compromised by hackers. A paper by Thomas Choi, professor of Supply Chain Management and Harold E. Fearon Chair of Purchasing Management, and his co-author identify five supply network vulnerability examples to help companies understand the malicious actors who search for the “path of least resistance” into their networks.
In this article on The Economist June 11, 2019:
Research by Zac Rogers of Colorado State University and Thomas Thomas Choi of Arizona State University suggests that over 60% of the reported cyberattacks on publicly traded American firms in 2017 were launched through the computer systems of suppliers or contractors, up from less than a quarter in 2010.
Latest news
- Flexible ASU Evening MBA helped Layla Gabir build new confidence, connections, and career momentum
Layla Gabir (Evening MBA '26) works full-time as an epidemiologist for Maricopa County and…
- Computer information systems student Andrew Patel balances school with full-time work, earning stockbroker certification
Andrew Patel (BS Computer Information Systems '26) was looking for a program that combined…
- MRED program set W. P. Carey grad up for career success
Alum Zachary Hartman (MRED '10) shares how ASU's Master of Real Estate…