Summary is AI-generated, newsdesk-reviewed
  • NIST updates guidance to combat rising supply chain cyber-attacks, says Illumio's Trevor Dearing.
  • Zero Trust security boosts confidence by restricting communications to verified environments.
  • Cyber-attacks on logistics have real-world impacts, increasing the likelihood of ransom payments.

Trevor Dearing, the EMEA Director of Critical Infrastructure Solutions at Illumio, said “It is encouraging to see NIST releasing updated guidance acknowledging the increase in cyber-attacks targeting the supply chain and the consequent necessity to bolster the supply chain’s cyber security. We can no longer turn a blind eye to the exponential increase in attacks on the IT systems of manufacturers, logistics companies and organisations, which ultimately target the operational part of the business.

Cyber-attacks have real-world impacts

Cyber-attacks that disrupt the logistics or manufacturing process can have immediate real-world impacts"

He adds, “The truth is threat actors have realised they can increase efficiency and profitability, by compromising a single product, knowing it will have impact downstream on companies who use it.

Trevor Dearing continues, “Moreover, cyber-attacks that disrupt the logistics or manufacturing process can have immediate real-world impacts, further increasing the likelihood that any ransom demands will be met, as organisations flounder to get critical systems back up and running. The result is that supply chain attacks have increased with a vengeance.

Zero Trust approach to security

He adds “A Zero Trust approach to security provides organisations with confidence in their supply chain security because by only allowing known and verified communication between environments, security teams can be sure that an attack on the IT systems will not affect the management or logistics processes.

Trevor Dearing concludes, “With the move to industry 4.0 and the adoption of cloud connected industrial IoT (Internet of Things), the potential impact of a ransomware attack will only continue to grow. That’s why, it is important to act now and put security measures in place that will make our infrastructure resilient to attacks – even once they’ve breached our perimeter.

Discover how AI, biometrics, and analytics are transforming casino security

Author profile

Trevor Dearing EMEA Director of Critical Infrastructure Solutions, Illumio

In case you missed it

Which vertical markets have the greatest growth potential for security?
Which vertical markets have the greatest growth potential for security?

To serve various vertical markets and industries effectively, security professionals must recognise that each sector has unique assets, risks, compliance requirements, and operatio...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s behind (perimeter) door #1?
What’s behind (perimeter) door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...