Managing Cyber Supply Chain Risks

May 15, 2013

Cyberspace has long been plagued by hackers and malware. Hackers can trace their origins to the “phone phreaks” of the 1970s, who hacked into phone systems to make free long distance calls.1 The first virus was set loose on the Internet even before it was the Internet: the Creeper virus was first detected on ARPANET, the forerunner of the Internet, in 1971.2 Early on, hackers and virus writers were more annoying than dangerous, but today they represent serious threats not only to individuals and businesses, but to entire nations and even the global economy. According to Norton, the global cybercrime industry – which is now dominated by organized, professional gangs – has already overtaken the global trade in heroin, cocaine and marijuana.3 Politically motivated hackers – “hacktivists” – have penetrated heavily fortified military and government intelligence networks. China has been implicated in systematic attacks on U.S. computer networks – from the Defense Department to Google to JP Morgan Chase. A 2008 Russian cyber assault crippled the essential electronic infrastructure of the Republic of Estonia.

Spotlight

Allen Corporation of America

Allen Corporation of America's mission is to provide professional services and best-in-class products to both public and private sector clients. We specialize in several major technology areas, including: Logistics; Cyber Security; Technology; Training Systems; Integrated Networks; and Enterprise Management. Allen Corporation is the parent company of WetStone Technologies, an industry leader in software products (Gargoyle, LiveWire Investigator, StegoSuite, LiveDiscover, Sovereign Time, FairWitness), training, services, and research and development in the areas of advanced threat identification, steganography, trusted time-stamping, digital investigation and computer forensics.

OTHER WHITEPAPERS
news image

2023 Hybrid Cloud Security Survey

whitePaper | June 26, 2023

While we are witnessing a modest slowdown in cloud migration due to rising costs and economic uncertainty, it remains that a multitude of organizations now have a hybrid infrastructure in place. According to Forrester analysts,1 this is deemed very much the norm and reports show 72 percent of organizations exist in the hybrid cloud.2 This is because enterprises will likely have paired their own data center/private cloud with one or more public clouds as a result of acquisition or to reap a number of benefits: Cisco, for example, identified 42 percent of organizations believe they achieve a more agile and scalable development environment within the hybrid cloud, alongside 40 percent who realize accelerated business agility and innovation.3

Read More
news image

5 Top Residential Security Trends to Watch in 2023

whitePaper | February 24, 2023

The security industry has gained millions of households due to the explosion of DIY offerings and COVID-19. Households sought stability and safety during COVID and were able to find low-cost solutions. In 2022 though, home security system adoption slowed with home security ownership dropping from 2021 levels. The industry’s top players, however, are achieving record revenue in 2022 and that shows no signs of slowing. The rebound of professional installation since 2020 and recent solar system and service offerings have generated robust revenue growth.

Read More
news image

Citrix Cloud Services Data Protection Overview

whitePaper | September 29, 2022

Citrix understands that data protection is one of the top priorities for our customers when selecting a cloud service. Data protection is also a rapidly-evolving domain and requires enterprises to assess more information over time about the data handling practices of their vendors.

Read More
news image

Cybersecurity - for safe and secure mobility

whitePaper | June 6, 2022

In a world that is increasingly connected and digital, cybersecurity is no longer simply an operational requirement – it is an economic necessity that is vital to the ongoing health of any business.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More

Spotlight

Allen Corporation of America

Allen Corporation of America's mission is to provide professional services and best-in-class products to both public and private sector clients. We specialize in several major technology areas, including: Logistics; Cyber Security; Technology; Training Systems; Integrated Networks; and Enterprise Management. Allen Corporation is the parent company of WetStone Technologies, an industry leader in software products (Gargoyle, LiveWire Investigator, StegoSuite, LiveDiscover, Sovereign Time, FairWitness), training, services, and research and development in the areas of advanced threat identification, steganography, trusted time-stamping, digital investigation and computer forensics.

Events