Cyber Threats to the Bioengineering Supply Chain

January 25, 2019

The Bioengineering supply chain begins with the acquisition of either a physical genetic sample or an existing data record, which could be downloaded from a repository such as the National Center for Biotechnology Information Genbank FTP website. This data is sequenced, stored, analyzed and disseminated on various platforms to include Local Area Networks and cloud services (2018, Bajema). Universities, pharmaceutical companies, the genomic sequencing industry and genetic testing companies rely on the availability of this data. While machines are programmed with binary code to include 0s and 1s, in biology, genetic code relies on As (adenine), Cs (cytosine), Gs (guanine) and Ts (thymine). Data stored in either form may be vulnerable to theft, sabotage or manipulation by adversaries.

Spotlight

Integrated Solutions

Integrated Solutions (IS) is a specialized ICT integrator and a part of the biggest telecom company in Central and Eastern Europe – Orange Polska Capital Group. It gives us access to the competence, experience and resources of Orange Polska, while also giving us freedom of operation, credibility and financial stability.

OTHER WHITEPAPERS
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More
news image

Closing the Human Error Gap in Cybersecurity

whitePaper | June 23, 2023

The increasing reliance on digital technology has made cybersecurity a critical concern for organizations worldwide. While technological advancements have provided businesses with unprecedented opportunities, they have also exposed them to a myriad of cyber threats. In this context, human error has emerged as a significant vulnerability. While an overwhelming majority of the human error related wrong decisions are unintentional, they can happen to anyone. This whitepaper aims to provide a comprehensive approach to closing the human error gap in cybersecurity, focusing on both cybersecurity awareness training and proactive security measures that minimize the need for users to be cyber smart.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

Security Challenges for the Energy Industry on the Industrial Internet of Things

whitePaper | November 4, 2022

The Industrial Internet of Things (IIoT) is a relatively new computing paradigm that combines machine learning (ML), artificial intelligence (AI), remote sensors, and device-control applications (or “apps”) to help businesses and industry achieve more efficient and reliable operations. In the oil and gas field, IIoT is used for a variety of purposes—from fully autonomous pump and valve control to remote sensing of security breaches at isolated wellsites.

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More
news image

Adobe Primetime Advertising Security Overview

whitePaper | December 30, 2022

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Read More

Spotlight

Integrated Solutions

Integrated Solutions (IS) is a specialized ICT integrator and a part of the biggest telecom company in Central and Eastern Europe – Orange Polska Capital Group. It gives us access to the competence, experience and resources of Orange Polska, while also giving us freedom of operation, credibility and financial stability.

Events