• Support
  • (+84) 246.276.3566 | contact@eastgate-software.com
  • Request a Demo
  • Privacy Policy
English
English 日本語 Deutsch
Eastgate Software A Global Fortune 500 Company's Strategic Partner
  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers
CONTACT US
Eastgate Software
  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers
CONTACT US
Eastgate Software
Home Tech Enthusiast
September 15, 2025

Third-Party Cybersecurity Risks: Closing Enterprise Supply Chain Blind Spots

Cybersecurity

Third-Party Cybersecurity Risks: Closing Enterprise Supply Chain Blind Spots

As enterprises accelerate digital transformation, a growing share of cybersecurity risk stems not from internal systems but from partners, vendors, and third-party providers. Experts warn that fragmented supply chains, cloud adoption gaps, and AI-driven threats are creating dangerous blind spots. 

Kavitha Mariappan, Chief Technology and Experience Officer (CTxO) at Rubrik, told iTNews Asia that many organizations lack visibility into their third-party ecosystems, leaving inconsistent access controls and weak vendor security hygiene unchecked. Too often, risk management is reduced to annual compliance surveys rather than continuous monitoring. 

Cloud migration has compounded the challenge. Many companies wrongly assume security responsibilities lie solely with providers. In reality, shared responsibility models mean enterprises must secure configurations, access controls, and data — particularly when third parties are involved. 

The rise of generative AI (GenAI) further intensifies the risk. Threat actors are using AI to create highly targeted phishing campaigns, impersonate executives, and exploit vendor service desks. Even benign AI adoption can inadvertently expose confidential data if tools store or re-use proprietary information for training purposes. 

To strengthen resilience, Mariappan highlighted several priorities: 

  • Vendor ecosystem mapping: including “fourth-party” dependencies using Software Bills of Materials (SBoMs). 
  • Continuous verification: shifting from trust-by-default to ongoing access validation and telemetry-based anomaly detection. 
  • Threat modeling and risk scoring: simulating attack paths through third-party environments and updating risk profiles dynamically. 
  • Resilient recovery: maintaining immutable, air-gapped backups, third-party-inclusive incident playbooks, and Zero Trust enforcement across extended supply chains. 

Looking forward, Mariappan pointed to Agentic AI as a frontier technology that could both accelerate incident response and introduce new risks if not governed effectively. 

“Identifying weak links is no longer enough,” she said. “We need to model how attacks might spread through supply chains and respond before damage is done.” 

 

Source: 

https://www.itnews.asia/news/are-third-party-blind-spots-the-weakest-link-in-enterprise-cybersecurity-chain-620196  

Tags: cybersecurity
Something went wrong. Please try again.
Thank you for subscribing! You'll start receiving Eastgate Software's weekly insights on AI and enterprise tech soon.
ShareTweet

Categories

  • AI (202)
  • Application Modernization (9)
  • Case study (34)
  • Cloud Migration (46)
  • Cybersecurity (29)
  • Digital Transformation (7)
  • DX (17)
  • Ebook (12)
  • ERP (39)
  • Fintech (27)
  • Fintech & Trading (1)
  • Intelligent Traffic System (1)
  • ITS (5)
  • Life (23)
  • Logistics (1)
  • Low-Code/No-Code (32)
  • Manufacturing Industry (1)
  • Microservice (17)
  • Product Development (36)
  • Tech Enthusiast (344)
  • Technology Consulting (68)
  • Uncategorized (2)

Tell us about your project idea!

Sign up for our weekly newsletter

Stay ahead with Eastgate Software, subscribe for the latest articles and strategies on AI and enterprise tech.

Something went wrong. Please try again.
Thank you for subscribing! You'll start receiving Eastgate Software's weekly insights on AI and enterprise tech soon.

Eastgate Software

We Drive Digital Transformation

Eastgate Software 

We Drive Digital Transformation.

  • Services
  • Company
  • Resources
  • Case Studies
  • Contact
Services

Case Studies

Company

Contact

Resources
  • Youtube
  • Facebook
  • Linkedin
  • Outlook
  • Twitter
DMCA.com Protection Status

Copyright © 2024.  All rights reserved.

  • Home
  • Company
  • Services
    • Business Process Optimization
    • Custom Software Development
    • Systems Integration
    • Technology Consulting
    • Cloud Services
    • Data Analytics
    • Cybersecurity
    • Automation & AI Solutions
  • Case Studies
  • Blog
  • Resources
    • Life
    • Ebook
    • Tech Enthusiast
  • Careers

Support
(+84) 246.276.35661 contact@eastgate-software.com

  • Request a Demo
  • Privacy Policy
Book a Free Consultation!