
How do we keep the supply chain cyber secure?
Hostage software, phishing, vulnerable software and other forms of unauthorised access to servers and networks – all of which makes every company a potential prey for cybercriminals. And because of the interconnectedness in the chain, it is no longer enough to have one's own cybersecurity in order. Cybercriminals are increasingly hacking into their ultimate targets via suppliers and business partners.
Cybersecurity in the supply chain
Cybersecurity in the supply chain is a many-headed monster. It is clear that there is no 'silver bullet' to prevent problems, both structural and specific. However, that does not mean that every organisation should simply wait for the first incident to happen before taking action. TNO specifies three concrete steps towards improved digital security in the supply chain. You can read all about it in the paper "When the chain itself is the weakest link".
3 steps to digital security in the supply chain
Download the paper "When the chain itself is the weakest link"
Details of the paper
After reading the paper you will know more about:
- The challenges of Chief Information Security Officers (CISOs) in the production chain . In addition to their own cyber resilience, they must also be aware of attacks or disruptions from parties they trust - but who are outside their circle of influence.
- Three concrete steps towards improved digital security in the supply chain . How can organisations innovate to boost resilience against digital attacks, especially in complex chains.
- Use Cases reveal how TNO, together with national and international partners, develops technologies to keep the supply chain digitally secure.
Get inspired
TNO’s view of 2030: Digital privacy and security for everyone
Privacy and cyber security are the cornerstones of our digital society. With smart innovations like SSI technology, we will ensure that citizens exchange online data without any concerns by 2030. Read how.


The PQC Migration Handbook
Commissioned by the AIVD, TNO has compiled a handbook together with CWI. This handbook offers organisations advice and concrete steps to mitigate the risk of quantum computers to cryptography.


Cyber security challenges and innovations
Which cyber security challenges will the Netherlands face now and in the (near) future? TNO is working on the technologies and innovations of today ánd tomorrow.


Quantum computer is a threat to data protection
Quantum technology offers opportunities for societal. At the same time, it is a threat to our cyber security.


Applied Cryptography & Quantum Algorithms
The Applied Cryptography & Quantum Algorithms expertise group aims for quantum-safe society, secure data sharing and privacy enhancement in the quantum age.