Summary is AI-generated, newsdesk-reviewed
  • Illumio emphasizes NIST's updated guidance to counter increasing supply chain cyber-attacks.
  • Zero Trust security boosts confidence, ensuring isolated attacks on supply chains' IT systems.
  • Industry 4.0 and IoT adoption heighten ransomware risks, necessitating robust security measures.

Trevor Dearing, the EMEA Director of Critical Infrastructure Solutions at Illumio, said “It is encouraging to see NIST releasing updated guidance acknowledging the increase in cyber-attacks targeting the supply chain and the consequent necessity to bolster the supply chain’s cyber security. We can no longer turn a blind eye to the exponential increase in attacks on the IT systems of manufacturers, logistics companies and organizations, which ultimately target the operational part of the business.

Cyber-attacks have real-world impacts

Cyber-attacks that disrupt the logistics or manufacturing process can have immediate real-world impacts"

He adds, “The truth is threat actors have realized they can increase efficiency and profitability, by compromising a single product, knowing it will have impact downstream on companies who use it.

Trevor Dearing continues, “Moreover, cyber-attacks that disrupt the logistics or manufacturing process can have immediate real-world impacts, further increasing the likelihood that any ransom demands will be met, as organizations flounder to get critical systems back up and running. The result is that supply chain attacks have increased with a vengeance.

Zero Trust approach to security

He adds “A Zero Trust approach to security provides organizations with confidence in their supply chain security because by only allowing known and verified communication between environments, security teams can be sure that an attack on the IT systems will not affect the management or logistics processes.

Trevor Dearing concludes, “With the move to industry 4.0 and the adoption of cloud-connected industrial IoT (Internet of Things), the potential impact of a ransomware attack will only continue to grow. That’s why, it is important to act now and put security measures in place that will make our infrastructure resilient to attacks – even once they’ve breached our perimeter.

Discover how AI, biometrics, and analytics are transforming casino security

Author profile

Trevor Dearing EMEA Director of Critical Infrastructure Solutions, Illumio

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...