The Good Tech Companies - SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats
Episode Date: January 14, 2026This story was originally published on HackerNoon at: https://hackernoon.com/spycloud-launches-supply-chain-solution-to-combat-rising-third-party-identity-threats. The s...olution is moving enterprises and government agencies from static risk scoring to protecting against actual identity threats. The top 98 defense industrial Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #spycloud, #cybernewswire, #press-release, #spycloud-announcement, #cyber-threats, #cybersecurity-tips, #good-company, and more. This story was written by: @cybernewswire. Learn more about this writer by checking @cybernewswire's about page, and for more stories, please visit hackernoon.com. SpyCloud Supply Chain Threat Protection delivers unprecedented visibility into vendor identity exposures. The solution is moving enterprises and government agencies from static risk scoring to protecting against actual identity threats. The top 98 defense industrial base suppliers had over 11,000 dark web exposed credentials last year.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
SpyCloud launches supply chain solution to combat rising third-party identity threats by Cyber Newswire.
Austin, Texas, USA, January 14, 2026, Cyber Newswire, new monitoring capability delivers unprecedented visibility
into vendor identity exposures, moving enterprises and government agencies from static risk scoring
to protecting against actual identity threats.
SpyCloud, the leader in identity threat protection,
today announced the launch off its supply chain threat protection solution,
an advanced layer of defense that expands identity threat protection
across the extended workforce, including organizations' entire vendor ecosystems.
Unlike traditional third-party risk management platforms
that rely on external surface indicators and static scoring,
Spy Cloud supply chain threat protection provides timely access to identity threats
derived from billions of recaptured breach, malware, fished, and combalist data assets, empowering
organizations from enterprise security teams to public sector agencies to act on credible threats
rather than simply observe and accept risk. Supply chain threat protection addresses a critical gap in
enterprise security, the inability to maintain real-time awareness of identity exposures affecting
third-party partners and vendors. According to the 2025 Verizon data breach investigations report,
third-party involvement in breaches doubled year over year, jumping from 15% to 30% primarily
due to software vulnerabilities and weak security practices. As supply chain compromises continue to
escalate, security teams need intelligence that goes beyond questionnaires and external scans to
reveal active threats like fishing campaigns targeting their trusted partners, confirmed credential
theft, and malware-infected devices exposing critical business applications to criminals. For government
agencies and critical infrastructure operators, supply chain threats present national security
risks that demand heightened vigilance.
Public sector organizations managing sensitive data and critical services increasingly rely on
contractors and technology vendors whose compromised credentials could provide adversaries
with pathways into classified systems or essential infrastructure.
Last year alone, the top 98 defense industrial base suppliers had over 11,000 dark web-exposed
credentials, an 81% increase from the previous year. Spy Cloud supply chain threat protection
enables federal, state, and local agencies to identify when suppliers or contractors have been
compromised, allowing them to talk a proactive measures before an identity exposure escalates
into a matter of national security. Greater than third-party threats have evolved far beyond what
traditional vendor greater than assessment tools can detect, said Damon Fleury,
chief product officer at greater than SpyCloud.
Greater than public and private sector organizations need to know when their vendors greater
than employees are actively compromised by malware or fishes, when authentication greater than data
is circulating on the dark web, and which partners pose the greatest real greater than
downstream threat to their business. Our new solution delivers those signals greater than by
transforming raw underground data into clear, prioritized actions that greater than security teams
used to protect their organization. Supply chain threat protection enables organizations and agencies
to continuously monitor thousands of suppliers, with each company's threats enumerated in detail,
and also represented in an at-a-glance identity threat index. The index is a comprehensive
and continuously updated analysis that quantifies vendor security posture through the lens of
identity exposure, Frombeth active in historical fishing, breach, and malware sources,
and surfaces which partners pose the most significant risk based on verified dark web intelligence.
Key capabilities include real evidence of compromise, timely recaptured identity data from breaches,
malware, and successful fishes collected continuously from the criminal underground,
with context that gives security teams enhanced visibility into the identity threats facing suppliers today.
Identity threat index aggregates multiple verified data sources weighted by the recency,
volume, credibility, and severity of compromise, emphasizing verified identity data over static
breach records for more robust and real-time visibility into vendor risk. Compromised applications
identifies the internal and third-party business applications exposed on malware-infected
supplier devices to support deeper investigation and risk assessment. Enhanced vendor
management and communications facilitate sharing of actionable evidence and detailed executive-level
reports directly with vendors to collaboratively improve security posture, transforming vendor
relationships from adversarial scoring to collaborative protection. Integrated response.
Leveraging SpyCloud's console, teams now have access to identity threat protection beyond the traditional
employee perimeter with this extension to suppliers, allowing analysts to respond to workforce
identity threats within a single tool. Spike Cloud supply chain threat protection is designed to
support multiple use cases across security operations, Infosec, vendor risk management, and
GRC teams. Organizations can leverage the solution for vendor due diligence during procurement
and onboarding, continuous risk reviews to strengthen vendor relationships, and accelerated
incident response when vendor exposures threaten their own environments. Greater than, security
teams and their counterparts across the business are overwhelmed greater than with vendor
assessments, questionnaires, and risk scores that often don't greater than translate to real
prevention, said Alex Greer, group product manager at greater than SpyCloud.
Greater than our customers have often reported that when they're evaluating doing business
greater than with a new vendor, they lack the actionable data their legal and compliance greater
than teams need for evidence-based decision-making. That's where Spy Cloud stands greater than
out, surfacing verified identity threats tied directly to vendor compromise, greater than
letting teams escalate to leadership when to restrict data access and greater than prioritize efforts
for the greatest impact on reducing organizational risk. Unlike existing solutions that rely on
external surface indicators and static scoring, SpyCloud provides threat data derived from underground sources,
the same recaptured darknet identity data that criminals actively used to target organizations and
agencies. This fundamental difference enables Spy Cloud customers to move from passive risk acceptance
to proactive and holistic identity threat protection. To learn more about defending organizations
from the exposures of vendors and suppliers, registration is open for Spy Cloud's upcoming
live virtual event, beyond vendor risk scores. How to solve the hidden identity crisis in your supply
chain on Thursday, January 22, 2026, at 11 a.m. Central Time. About SPY Cloud Spike Cloud
transforms recaptured darknet data to disrupt cybercrime. Its automated identity threat protection
solutions leverage advanced analytics and AI to proactively prevent ransomware and account takeover.
detect insider threats, safeguard employee and consumer identities, and accelerate cyber crime investigations.
SpyCloud's data from breaches, malware-infected devices, and successful Fishas also powers many
popular dark web monitoring and identity theft protection offerings. Customers include seven of the
Fortune 10, along with hundreds of global enterprises, mid-sized companies, and government agencies
worldwide. Headquartered in Austin, Texas, SpyCloud is home to more than 200 cybersecurity experts
whose mission is to protect businesses and consumers from the stolen identity data criminals are
using to target them now. To learn more and see insights on your company's exposed data, users can
visit SpyCloud.com contact media specialist Phil Tortora REQ on behalf of Spy Cloud SpyCloud at Rec.
CO This Story was published as a press release by Cyber Newswire under Hackernoon Business Blogging Program.
Do your own research before making any financial decision.
Thank you for listening to this Hackernoon story, read by artificial intelligence.
Visit hackernoon.com to read, write, learn and publish.
