The Good Tech Companies - SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats

Episode Date: January 14, 2026

This story was originally published on HackerNoon at: https://hackernoon.com/spycloud-launches-supply-chain-solution-to-combat-rising-third-party-identity-threats. The s...olution is moving enterprises and government agencies from static risk scoring to protecting against actual identity threats. The top 98 defense industrial Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #spycloud, #cybernewswire, #press-release, #spycloud-announcement, #cyber-threats, #cybersecurity-tips, #good-company, and more. This story was written by: @cybernewswire. Learn more about this writer by checking @cybernewswire's about page, and for more stories, please visit hackernoon.com. SpyCloud Supply Chain Threat Protection delivers unprecedented visibility into vendor identity exposures. The solution is moving enterprises and government agencies from static risk scoring to protecting against actual identity threats. The top 98 defense industrial base suppliers had over 11,000 dark web exposed credentials last year.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. SpyCloud launches supply chain solution to combat rising third-party identity threats by Cyber Newswire. Austin, Texas, USA, January 14, 2026, Cyber Newswire, new monitoring capability delivers unprecedented visibility into vendor identity exposures, moving enterprises and government agencies from static risk scoring to protecting against actual identity threats. SpyCloud, the leader in identity threat protection, today announced the launch off its supply chain threat protection solution, an advanced layer of defense that expands identity threat protection
Starting point is 00:00:39 across the extended workforce, including organizations' entire vendor ecosystems. Unlike traditional third-party risk management platforms that rely on external surface indicators and static scoring, Spy Cloud supply chain threat protection provides timely access to identity threats derived from billions of recaptured breach, malware, fished, and combalist data assets, empowering organizations from enterprise security teams to public sector agencies to act on credible threats rather than simply observe and accept risk. Supply chain threat protection addresses a critical gap in enterprise security, the inability to maintain real-time awareness of identity exposures affecting
Starting point is 00:01:17 third-party partners and vendors. According to the 2025 Verizon data breach investigations report, third-party involvement in breaches doubled year over year, jumping from 15% to 30% primarily due to software vulnerabilities and weak security practices. As supply chain compromises continue to escalate, security teams need intelligence that goes beyond questionnaires and external scans to reveal active threats like fishing campaigns targeting their trusted partners, confirmed credential theft, and malware-infected devices exposing critical business applications to criminals. For government agencies and critical infrastructure operators, supply chain threats present national security risks that demand heightened vigilance.
Starting point is 00:01:59 Public sector organizations managing sensitive data and critical services increasingly rely on contractors and technology vendors whose compromised credentials could provide adversaries with pathways into classified systems or essential infrastructure. Last year alone, the top 98 defense industrial base suppliers had over 11,000 dark web-exposed credentials, an 81% increase from the previous year. Spy Cloud supply chain threat protection enables federal, state, and local agencies to identify when suppliers or contractors have been compromised, allowing them to talk a proactive measures before an identity exposure escalates into a matter of national security. Greater than third-party threats have evolved far beyond what
Starting point is 00:02:41 traditional vendor greater than assessment tools can detect, said Damon Fleury, chief product officer at greater than SpyCloud. Greater than public and private sector organizations need to know when their vendors greater than employees are actively compromised by malware or fishes, when authentication greater than data is circulating on the dark web, and which partners pose the greatest real greater than downstream threat to their business. Our new solution delivers those signals greater than by transforming raw underground data into clear, prioritized actions that greater than security teams used to protect their organization. Supply chain threat protection enables organizations and agencies
Starting point is 00:03:18 to continuously monitor thousands of suppliers, with each company's threats enumerated in detail, and also represented in an at-a-glance identity threat index. The index is a comprehensive and continuously updated analysis that quantifies vendor security posture through the lens of identity exposure, Frombeth active in historical fishing, breach, and malware sources, and surfaces which partners pose the most significant risk based on verified dark web intelligence. Key capabilities include real evidence of compromise, timely recaptured identity data from breaches, malware, and successful fishes collected continuously from the criminal underground, with context that gives security teams enhanced visibility into the identity threats facing suppliers today.
Starting point is 00:04:02 Identity threat index aggregates multiple verified data sources weighted by the recency, volume, credibility, and severity of compromise, emphasizing verified identity data over static breach records for more robust and real-time visibility into vendor risk. Compromised applications identifies the internal and third-party business applications exposed on malware-infected supplier devices to support deeper investigation and risk assessment. Enhanced vendor management and communications facilitate sharing of actionable evidence and detailed executive-level reports directly with vendors to collaboratively improve security posture, transforming vendor relationships from adversarial scoring to collaborative protection. Integrated response.
Starting point is 00:04:45 Leveraging SpyCloud's console, teams now have access to identity threat protection beyond the traditional employee perimeter with this extension to suppliers, allowing analysts to respond to workforce identity threats within a single tool. Spike Cloud supply chain threat protection is designed to support multiple use cases across security operations, Infosec, vendor risk management, and GRC teams. Organizations can leverage the solution for vendor due diligence during procurement and onboarding, continuous risk reviews to strengthen vendor relationships, and accelerated incident response when vendor exposures threaten their own environments. Greater than, security teams and their counterparts across the business are overwhelmed greater than with vendor
Starting point is 00:05:26 assessments, questionnaires, and risk scores that often don't greater than translate to real prevention, said Alex Greer, group product manager at greater than SpyCloud. Greater than our customers have often reported that when they're evaluating doing business greater than with a new vendor, they lack the actionable data their legal and compliance greater than teams need for evidence-based decision-making. That's where Spy Cloud stands greater than out, surfacing verified identity threats tied directly to vendor compromise, greater than letting teams escalate to leadership when to restrict data access and greater than prioritize efforts for the greatest impact on reducing organizational risk. Unlike existing solutions that rely on
Starting point is 00:06:05 external surface indicators and static scoring, SpyCloud provides threat data derived from underground sources, the same recaptured darknet identity data that criminals actively used to target organizations and agencies. This fundamental difference enables Spy Cloud customers to move from passive risk acceptance to proactive and holistic identity threat protection. To learn more about defending organizations from the exposures of vendors and suppliers, registration is open for Spy Cloud's upcoming live virtual event, beyond vendor risk scores. How to solve the hidden identity crisis in your supply chain on Thursday, January 22, 2026, at 11 a.m. Central Time. About SPY Cloud Spike Cloud transforms recaptured darknet data to disrupt cybercrime. Its automated identity threat protection
Starting point is 00:06:52 solutions leverage advanced analytics and AI to proactively prevent ransomware and account takeover. detect insider threats, safeguard employee and consumer identities, and accelerate cyber crime investigations. SpyCloud's data from breaches, malware-infected devices, and successful Fishas also powers many popular dark web monitoring and identity theft protection offerings. Customers include seven of the Fortune 10, along with hundreds of global enterprises, mid-sized companies, and government agencies worldwide. Headquartered in Austin, Texas, SpyCloud is home to more than 200 cybersecurity experts whose mission is to protect businesses and consumers from the stolen identity data criminals are using to target them now. To learn more and see insights on your company's exposed data, users can
Starting point is 00:07:38 visit SpyCloud.com contact media specialist Phil Tortora REQ on behalf of Spy Cloud SpyCloud at Rec. CO This Story was published as a press release by Cyber Newswire under Hackernoon Business Blogging Program. Do your own research before making any financial decision. Thank you for listening to this Hackernoon story, read by artificial intelligence. Visit hackernoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.