{"total":3,"offset":0,"limit":3,"data":[{"thumbnail":"https://www.recordedfuture.com/graphics/media_1761bee37f93b48e1ef06d428986fdb3900314d4d.jpg","date":"","title":"Supply Chain Risk Mitigation","description":"Monitor, detect, and prepare for risks stemming from your vendors and partners.","link":"https://assets.recordedfuture.com/Reports/MitigateSupplyChainRisk.pdf","tags":"Solution brief"},{"thumbnail":"https://www.recordedfuture.com/graphics/reduce-threat-detection-investigation-response-time-hero-mobile-beb07aaa82.png","date":"","title":"The Security Team’s Guide to Supply Chain Threats","description":"Explore why our current supply chain security approaches are failing to stop breaches, and learn new approaches to managing supply chain security.","link":"https://go.recordedfuture.com/the-security-teams-guide-to-supply-chain-threats","tags":"eBook"},{"thumbnail":"https://www.recordedfuture.com/graphics/media_167af18c52ec3127cd5cfd8ac5aaf942a821b6160.png","date":"","title":"Supply Chain Resilience and the Power of Continuous Monitoring","description":"Learn how a threat intelligence approach to third-party risk management increases scalability and overall resilience.","link":"/blog/supply-chain-resilience-the-power-continuous-monitoring","tags":"Blog"}],"columns":["thumbnail","date","title","description","link","tags"],":type":"sheet"}