03.12.2021 Views

Cyber Defense eMagazine December Edition for 2021

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge! Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge!

Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

government has offered a bounty of up to $10million (£7.4m) <strong>for</strong> in<strong>for</strong>mation about the group, the largest<br />

bounty of its kind.<br />

The IT industry is not immune from supply chain attacks either. SolarWinds suffered an attack last year<br />

with hackers gaining access to the production system <strong>for</strong> Orion, SolarWinds’ flagship software. While in<br />

July, Kaseya, a provider of IT management software <strong>for</strong> MSPs and small to medium-sized businesses<br />

suffered a ransomware attack. As with the SolarWinds attack, the malware spread amongst Kaseya’s<br />

clients and affected dozens of businesses.<br />

So while organisations must manage the potential fallout of security breaches to themselves –<br />

reputational damage, disruption costs and more – the knock-on effect to customers, partners and the<br />

rest of the supply chain is potentially huge.<br />

Digitisation of the supply chain<br />

The ongoing digitisation of the supply chain, often through the cloud, has delivered major efficiency and<br />

cost benefits, with shared data and systems in areas such as integrated planning and execution systems,<br />

logistics visibility, autonomous logistics, smart procurement and warehousing, spare parts management<br />

and analytics.<br />

For a big company like Siemens, <strong>for</strong> example, working at the bleeding edge of supply chain innovation,<br />

the creation of a cloud-based operating system means that it can process data in real time from millions<br />

of devices and sensors in plants, systems, machinery and products dispersed throughout production<br />

processes and supply chains.<br />

Siemens may be working towards ‘supply chain nirvana’, where processes and decisions happen with<br />

minimal human intervention. But the reality <strong>for</strong> many suppliers, logistics companies, manufacturers and<br />

retailers is that business happens in browsers, on email and with shared files. The more we use the<br />

Internet to collaborate and communicate, the more we are exposed. Research has shown that web and<br />

email attacks are behind 90% 2 of all breaches.<br />

The increased adoption of cloud applications within the supply chain, accelerated by the challenges of<br />

COVID, has made the browser the most important productivity tool on any endpoint. But at the same<br />

time, the majority of cyber attacks start with the browser, and it doesn’t take much <strong>for</strong> a determined<br />

attacker to understand your key suppliers and partners and use this to target users with phishing emails<br />

and infected attachments, websites and downloadable documents.<br />

2<br />

Sources Google, Verisign<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!