
Sign up to save your podcasts
Or


You can lock down every system you own. Patch everything. Train everyone. And still lose control, because the failure didn't start with you. It started somewhere upstream.
This episode breaks down supply chain cybersecurity by explaining why attackers who can't reach you directly look for someone you already trust. It covers the most common patterns: tampered software updates that arrive through legitimate channels, vendor breaches that expose your data through someone else's failure, compromised third-party credentials, and dependency risk hidden inside assembled code libraries. The episode explains why these attacks scale so effectively and why they're hard to defend against, because they ride on legitimate trust. The starter kit covers identifying crown jewel data, mapping real vendor relationships, limiting vendor access aggressively, protecting vendor logins with mandatory MFA, monitoring vendor behavior, patching shared dependencies fast, asking better pre-purchase questions, putting security expectations in contracts, and maintaining backups that actually restore.
Whether you manage vendor relationships, oversee procurement decisions, or just want to understand why one compromised supplier can impact thousands of organizations, Plaintext with Rich explains the risk and the response.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
By Rich GreeneYou can lock down every system you own. Patch everything. Train everyone. And still lose control, because the failure didn't start with you. It started somewhere upstream.
This episode breaks down supply chain cybersecurity by explaining why attackers who can't reach you directly look for someone you already trust. It covers the most common patterns: tampered software updates that arrive through legitimate channels, vendor breaches that expose your data through someone else's failure, compromised third-party credentials, and dependency risk hidden inside assembled code libraries. The episode explains why these attacks scale so effectively and why they're hard to defend against, because they ride on legitimate trust. The starter kit covers identifying crown jewel data, mapping real vendor relationships, limiting vendor access aggressively, protecting vendor logins with mandatory MFA, monitoring vendor behavior, patching shared dependencies fast, asking better pre-purchase questions, putting security expectations in contracts, and maintaining backups that actually restore.
Whether you manage vendor relationships, oversee procurement decisions, or just want to understand why one compromised supplier can impact thousands of organizations, Plaintext with Rich explains the risk and the response.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene