Cyber Threats to the Bioengineering Supply Chain

January 25, 2019

The Bioengineering supply chain begins with the acquisition of either a physical genetic sample or an existing data record, which could be downloaded from a repository such as the National Center for Biotechnology Information Genbank FTP website. This data is sequenced, stored, analyzed and disseminated on various platforms to include Local Area Networks and cloud services (2018, Bajema). Universities, pharmaceutical companies, the genomic sequencing industry and genetic testing companies rely on the availability of this data. While machines are programmed with binary code to include 0s and 1s, in biology, genetic code relies on As (adenine), Cs (cytosine), Gs (guanine) and Ts (thymine). Data stored in either form may be vulnerable to theft, sabotage or manipulation by adversaries.

Spotlight

RedSeal

RedSeal provides a cybersecurity analytics solution to Global 2000 organizations that helps maximize their digital resilience. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, prioritizes needed actions, and provides critical information to quickly remediate issues.RedSeal’s security platform was designed to work with thousands of devices on complex networks. More than 200 Global 2000 corporations and government agencies worldwide use RedSeal to maximize their networks’ resilience. The company’s commercial customers span the finance, utilities, service provider, technology and retail sectors. RedSeal’s security platform is also used in many large US federal agencies, including the DoD, civilian and intelligence communities. Specialties: Network security, Continuous compliance, Vulnerability management, Continuous monitoring, Security metrics, IT risk management, Proactive security intelligence, Cybersecurity, Risk Analyt

OTHER WHITEPAPERS
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

Global Threat Landscape Report A Semiannual Report by FortiGuard Labs

whitePaper | August 16, 2022

Another half-year through unprecedented times has passed. But as unique as these times may feel, we continue to see familiar exploits, names, and attacks taking up space. To help you and your business feel confident in your ability to protect yourself against the threats that continue to come our way, this report looks back on the cyber threat landscape of the first half of 2022 using our global array of sensors monitored by FortiGuard Labs. Here’s what we learned:

Read More
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

CyberSecurity Under Stress

whitePaper | August 11, 2022

SecOps teams in the US and UK are being asked to do more with less, leading to higher stress levels that impact both their work and personal lives. The growing risk from cyber attacks is also compounded by significant recruitment and retention issues within cybersecurity.

Read More
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More

Spotlight

RedSeal

RedSeal provides a cybersecurity analytics solution to Global 2000 organizations that helps maximize their digital resilience. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, prioritizes needed actions, and provides critical information to quickly remediate issues.RedSeal’s security platform was designed to work with thousands of devices on complex networks. More than 200 Global 2000 corporations and government agencies worldwide use RedSeal to maximize their networks’ resilience. The company’s commercial customers span the finance, utilities, service provider, technology and retail sectors. RedSeal’s security platform is also used in many large US federal agencies, including the DoD, civilian and intelligence communities. Specialties: Network security, Continuous compliance, Vulnerability management, Continuous monitoring, Security metrics, IT risk management, Proactive security intelligence, Cybersecurity, Risk Analyt

Events