Attack Path Discovery: Supply Chain Security
From Shanghai to Los Angeles, IT services and systems now connect the various infrastructures of the supply chain, creating a complex web of dependencies. Each of these assets could theoretically become entry points for a cyberattack using known or new zero-day exploits. In addition to patching vulnerabilities, cyber defense teams need to take a proactive stance by deploying intrusion detection systems (IDS) to actively sniff out potential threats.
I already have a Free Member Account
Free Members Account Registration
Please register for a free members account to access all free content.
Once registered, you will not have to re-enter your details to download free papers.
Please note: You will receive an activation code via email. If you do not receive this email straight away, please check your spam folder.
Register for a Full Paid Members Account
Click here to choose from 3 membership packages and access over 1,700 technical papers.
PTI EDITION 79The supply chain is altering to fit a smarter future; technologies once perceived as threats are quickly becoming opportunities. This edition explores beyond the port to inform its readership about the incoming changes that will evolve ports into 'smart' nodes.