Managing Cyber Supply Chain Risks

May 15, 2013

Cyberspace has long been plagued by hackers and malware. Hackers can trace their origins to the “phone phreaks” of the 1970s, who hacked into phone systems to make free long distance calls.1 The first virus was set loose on the Internet even before it was the Internet: the Creeper virus was first detected on ARPANET, the forerunner of the Internet, in 1971.2 Early on, hackers and virus writers were more annoying than dangerous, but today they represent serious threats not only to individuals and businesses, but to entire nations and even the global economy. According to Norton, the global cybercrime industry – which is now dominated by organized, professional gangs – has already overtaken the global trade in heroin, cocaine and marijuana.3 Politically motivated hackers – “hacktivists” – have penetrated heavily fortified military and government intelligence networks. China has been implicated in systematic attacks on U.S. computer networks – from the Defense Department to Google to JP Morgan Chase. A 2008 Russian cyber assault crippled the essential electronic infrastructure of the Republic of Estonia.

Spotlight

Infoblox

Infoblox is the leader in cloud-first networking and cybersecurity services. Its solutions empower organizations to take full advantage of the cloud to deliver network experiences that are inherently simple, scalable and reliable for everyone, while maximizing existing infrastructure investments.

OTHER WHITEPAPERS
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Simplify Data Protection for VMware Workloads with Veeam Data Platform

whitePaper | March 1, 2023

Outages and data loss are an unfortunate reality for businesses today. These outages can cause big risks to your company’s reputation and revenue, as every minute of downtime means that critical data isn’t accessible to your business. If things weren’t complicated enough, managing a complex, hybrid, multi-cloud environment makes continuity even harder. These challenges increase complexity exponentially, greatly impacting your ability to stay in control.

Read More
news image

Amplify Your Ransomware Defenses: Protect, Detect and Recover

whitePaper | December 28, 2022

The Cohesity platform provides exceptional value for organizations to protect and manage vast enterprise data stores. But cyber criminals target data stores for various nefarious activities, most notably ransomware and data theft. Ransomware continues as the leading threat as it provides easy monetization, and therefore cyber criminals work non-stop to compromise organizations.

Read More
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Fujitsu PRIMERGY Server Security Overview

whitePaper | May 22, 2023

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

Read More
news image

OT/IoT Security Report Cyber War Insights, Threats and Trends, Recommendations

whitePaper | August 30, 2022

Nozomi Networks Labs is dedicated to reducing cyber risk for the world’s industrial and critical infrastructure organizations. Through its cybersecurity research and collaboration with industry and institutions, it helps defend the operational systems that support everyday life. The Labs team conducts investigations into industrial device vulnerabilities and, through a responsible disclosure process, contributes to the publication of advisories by recognized authorities.

Read More

Spotlight

Infoblox

Infoblox is the leader in cloud-first networking and cybersecurity services. Its solutions empower organizations to take full advantage of the cloud to deliver network experiences that are inherently simple, scalable and reliable for everyone, while maximizing existing infrastructure investments.

Events