<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/tag/scd/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog #SCD</title><description>Lifu Technologies - Blog #SCD</description><link>https://www.lifutechnologies.co.za/blogs/tag/scd</link><lastBuildDate>Thu, 16 Apr 2026 13:31:45 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Emerging External Cyber Defense Trends]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Emerging-External-Cyber-Defense-Trends</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Confluence General Patch Trends.png"/>all threats from outside of organizations' internal networks, such as those that come from suppliers, vendors, and other third parties, along with threats further outside the wire on the clear, deep, and dark web.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_vNDergEsQo6yoOk6kqMBPA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PA_Wmi_iRMWEnXA4QAJjoA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_v1gV55cyQjKIJHiArK_48g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_IW9ciIfnQtmv4qwXMqndtQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IW9ciIfnQtmv4qwXMqndtQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:24px;font-weight:700;">Be aware of your external ecosystem </span></p><p></p><p></p><p></p></div>
</div></div></div></h2></div><div data-element-id="elm_KV0WU0G-QcijLjMWZTlUng" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KV0WU0G-QcijLjMWZTlUng"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:9pt;font-weight:300;">In the following report, we have cataloged insights both on increasingly prevalent attack vectors as well as remediation and mitigation advice on relatively straightforward ways<br> to defend against them. For instance, the alarming rate of emerging vulnerability disclosures poses a threat to virtually all organizations, but whose risk can be greatly reduced with the relatively simple fix of patching as quickly as possible. </span></p></div>
</div></div></div><p></p></div></div><div data-element-id="elm_kyM_yuYbQzmPA2QW139z8g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_kyM_yuYbQzmPA2QW139z8g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/EmergingExternalCyberDefenseTrendsReport_02-Lifu.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 24 May 2023 13:57:57 +0200</pubDate></item><item><title><![CDATA[The Total Economic Impact Of BlueVoyant Supply Chain Defense]]></title><link>https://www.lifutechnologies.co.za/blogs/post/The-Total-Economic-Impact™-Of-BlueVoyant-Supply-Chain-Defense</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/SCD ROI.png"/>The Total Economic Impact Of BlueVoyant Supply Chain Defense - 292% return on investment (ROI) for a composite client over 3 years, and reduces the number of suppliers exceeding clients’ risk threshold by 70%.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_G9caYDnbQhmCpLGY7l_SIA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_U9iLQEL0SRS3Xw7jdx7AKQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_odQ4YxuiSk-9Xuzk3loYUg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_W2PZ6DRaRZSvyZMOAE4zZg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_W2PZ6DRaRZSvyZMOAE4zZg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span><span><span style="color:inherit;"><span>Cost Savings And Business Benefits<br><span>Enabled By Supply Chain Defense</span></span></span><br><br><span style="color:inherit;font-size:20px;"><br>BlueVoyant commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to find out. In addition to delivering a nearly 300% return on investment for a composite client organization, the survey highlights how BlueVoyant SCD enabled a 65% efficiency increase in risk monitoring risk, a 70% reduction in suppliers above risk threshold, and 60% reduction in time to remediate critical risks.</span></span></span></h2></div>
<div data-element-id="elm_bSco4sGvT9DgSKV58ycr0A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_bSco4sGvT9DgSKV58ycr0A"] .zpimage-container figure img { width: 788px !important ; height: 204px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_bSco4sGvT9DgSKV58ycr0A"] .zpimage-container figure img { width:788px ; height:204px ; } } @media (max-width: 767px) { [data-element-id="elm_bSco4sGvT9DgSKV58ycr0A"] .zpimage-container figure img { width:788px ; height:204px ; } } [data-element-id="elm_bSco4sGvT9DgSKV58ycr0A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/SCD%20ROI.png" width="788" height="204" loading="lazy" size="original" alt="Financial benefits of SCD from BlueVoyant" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_SICUhkXsSe-1OMSx79Xtqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SICUhkXsSe-1OMSx79Xtqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><h2 style="line-height:1;"><span style="font-size:18px;"><span>Seventy percent of enterprise risk decision-makers agree that third-party risk is a business priority. While some companies are well defended, many are not and are constantly exposed to threats in their supply chains. <br></span></span></h2><h2 style="line-height:1;"><br></h2><h2 style="line-height:1;"><span style="font-size:18px;"><span>BlueVoyant Supply Chain Defense</span><span> provides organizations with a platform and service that identifies, validates, prioritizes, and confirms mitigation of cyber threats and vulnerabilities across supplier ecosystems</span></span></h2><h2></h2><h2></h2></div>
<p></p></div></div><div data-element-id="elm_0bax9ztxS8iPZkGYLZlBGw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_0bax9ztxS8iPZkGYLZlBGw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/TEI_Of_BlueVoyant_Supply_Chain_Defense_vF.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 01 May 2023 16:12:09 +0200</pubDate></item><item><title><![CDATA[Cyber Security risk posture of your supply chain in one screen shot]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Supply-Chain-Cyber-risk-in-one-dashboard</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/BlueVoyant SCD Portal.png"/> Managing distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners is quic ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Y1KOtx9rQhaoPdvF8TqtiA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_mI3luC7eSHiP2pZBcmph5Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PDz2lathQ1WVb3kMQbYpVw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_bcy3A0qvQXa-I7xaLrOgnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_bcy3A0qvQXa-I7xaLrOgnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div><p><span style="font-size:18pt;font-weight:700;">Identify, validate, prioritize, and confirm mitigation of cyber threats and vulnerabilities </span></p></div>
</div></div></div></div></h2></div><div data-element-id="elm_NmMGa5NpRK-ccpuzs8IAHw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NmMGa5NpRK-ccpuzs8IAHw"].zpelem-text { border-radius:1px; margin-block-start:18px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div><p><span style="font-size:10pt;font-weight:300;">Managing distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners is quickly becoming the defining cybersecurity challenge in today’s increasingly complex environment. As organizations have increased the number and variety of third parties they work with, they have simultaneously exposed their enterprises to the vulnerabilities of those partners. </span></p></div>
</div></div></div></div><p></p></div></div><div data-element-id="elm_WKgnPmoUTOWKDQLcpJ8QeQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_WKgnPmoUTOWKDQLcpJ8QeQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Lifu%20Terrain%20Supply%20Chain%20Defense.pdf" download><span class="zpbutton-content">Download here</span></a></div>
</div><div data-element-id="elm_SOVqxt0fdFl3lANebPFROA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SOVqxt0fdFl3lANebPFROA"] .zpimage-container figure img { width: 1070px ; height: 585.83px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SOVqxt0fdFl3lANebPFROA"] .zpimage-container figure img { width:723px ; height:395.84px ; } } @media (max-width: 767px) { [data-element-id="elm_SOVqxt0fdFl3lANebPFROA"] .zpimage-container figure img { width:415px ; height:227.21px ; } } [data-element-id="elm_SOVqxt0fdFl3lANebPFROA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/BlueVoyant%20SCD%20Portal.png" width="415" height="227.21" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 16:13:08 +0200</pubDate></item><item><title><![CDATA[What Board Members Should Know]]></title><link>https://www.lifutechnologies.co.za/blogs/post/what-board-members-should-know</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/What the board needs to know - SCD.png"/>At the same time, it’s imperative to understand how your organization will be impacted either directly by a cybersecurity breach, or indirectly by vul ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_d4fTtIjORMih7-1HRnKUsg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_53FoAkatRZ6mFF-f42WbnA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ITBzwbp4RI61hM5xNvRNow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_ITBzwbp4RI61hM5xNvRNow"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_9N8wevNoTtmyUnscqmBpIQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9N8wevNoTtmyUnscqmBpIQ"].zpelem-heading { border-radius:1px; padding:0px; } </style><h1
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div style="color:inherit;"><h1><span style="color:inherit;font-size:20px;"><span style="font-weight:300;">While your organization may have its internal network’s security covered, it is critical that you and every other leader at your organization know that your digital attack surface (i.e. all of the points where cyber threat actors can try to breach an IT perimeter) is much larger and more complex than many realize. </span></span></h1><h1></h1><h1></h1></div><p></p></div></div></div></div></h1></div>
<div data-element-id="elm_Q4hTfnoLSTifRR4eYvj7EA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Q4hTfnoLSTifRR4eYvj7EA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div style="color:inherit;"><div><div><div><div><div style="color:inherit;"><div><div><div><p><span style="font-size:10pt;font-weight:300;">At the same time, it’s imperative to understand how your organization will be impacted either directly by a cybersecurity breach, or indirectly by vulnerabilities within your supply chain from a business continuity and trust perspective. </span></p></div>
</div></div></div></div></div></div></div></div><p><span style="font-size:10pt;font-weight:300;"><a href="/files/Lifu%20Branded%20Materials/Lifu%20-%20SupplyChainDefenseWhataBoardNeedstoKnowWhitePaper_watermark-1.pdf" rel="" download="">Download full document here</a><br></span></p><p></p><p></p><p></p></div>
</div></div></div><p></p></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 15:33:21 +0200</pubDate></item></channel></rss>