Cyber Threats to the Bioengineering Supply Chain

January 25, 2019

The Bioengineering supply chain begins with the acquisition of either a physical genetic sample or an existing data record, which could be downloaded from a repository such as the National Center for Biotechnology Information Genbank FTP website. This data is sequenced, stored, analyzed and disseminated on various platforms to include Local Area Networks and cloud services (2018, Bajema). Universities, pharmaceutical companies, the genomic sequencing industry and genetic testing companies rely on the availability of this data. While machines are programmed with binary code to include 0s and 1s, in biology, genetic code relies on As (adenine), Cs (cytosine), Gs (guanine) and Ts (thymine). Data stored in either form may be vulnerable to theft, sabotage or manipulation by adversaries.

Spotlight

Geek Squad

Geek Squad is the first national 24-hour task force dedicated to relieving the world's tech stress. Comprised of highly skilled and specially trained computing Agents, home entertainment installers (GSIs), Autotechs and appliance repairers (GSRs), our 20,000 active Agents patrol technology online, on the phone, at Geek Squad Precincts in all U.S. Best Buy stores and at service centers nationwide. Geek Squad Agents and Installers are ready to take the hassle out of your technology woes. They have the know-how and skill to set up and install your computer, network, home theater solution and car audio, video and navigation systems.

OTHER WHITEPAPERS
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

Optimizing Your Zero Trust Environment for Secure Video Conferencing

whitePaper | July 4, 2023

We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care? This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Read More
news image

Supercharge Your DLP Security Program

whitePaper | December 22, 2022

Today’s digitally transformed organizations handle vast volumes of data that is at perpetual risk for loss and leakage, either intentionally through data breaches or unintentionally through employee errors. With cybercrime damages expected to reach $10.5 trillion annually by 2025, 1 organizations must protect their threat surface holistically.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

Darktrace Cyber AI Analyst: Autonomous Investigations

whitePaper | February 9, 2023

This white paper examines the technology and design principles behind Darktrace's Cyber AI Analyst, a groundbreaking innovation that automates threat investigations at speed and scale.

Read More
news image

Data Security: The Key to Defeating Ransomware Attacks

whitePaper | May 26, 2022

Ransomware attacks have become increasingly pervasive and pernicious. Many organizations have suffered from at least one ransomware attack, and many ransomware victims have unfortunately been left with no resort other than paying the ransom and hoping to recover their data.

Read More

Spotlight

Geek Squad

Geek Squad is the first national 24-hour task force dedicated to relieving the world's tech stress. Comprised of highly skilled and specially trained computing Agents, home entertainment installers (GSIs), Autotechs and appliance repairers (GSRs), our 20,000 active Agents patrol technology online, on the phone, at Geek Squad Precincts in all U.S. Best Buy stores and at service centers nationwide. Geek Squad Agents and Installers are ready to take the hassle out of your technology woes. They have the know-how and skill to set up and install your computer, network, home theater solution and car audio, video and navigation systems.

Events