In 2019, attackers continued to target third parties, service providers, and supply chain partners with the intention of broadening the scale and impact of their attacks. Notable instances in 2019 included the following:
In 2020, we will see substantial increases in wireless data speeds as well as new applications and business models that will leverage fifth-generation (5G) wireless and Wi-Fi 6 (802.11ax). Both technologies will give enterprise users, consumers, and, yes, attackers the ability to rapidly transfer an enormous amount of data using new devices that will become available in 2020. The potential impact of these wireless technologies should be included in enterprise risk assessments and factored into policies such as bring your own device (BYOD).
I recently had the opportunity to take a public tour of an Amazon fulfillment center in Texas. It was an amazing experience and left me with a clear impression that loss of availability can have a colossal and devastating cyber impact on any organization with complex supply chains or time-sensitive customer services. We all focus on confidentiality of data, but in this case, availability took center stage.
From my first days as a private in the Army so many years ago, it was drummed into me that I needed to “know the enemy.” At that time, my platoon was regularly shown photographs and movies that depicted Soviet and Warsaw Pact soldiers in various states of fierceness. I have memories of the visions of hordes of burly soldiers in Soviet uniforms bounding through the snow and doing aggressive maneuvers. Our unit spent countless hours studying Soviet equipment, identifying tanks and aircraft, and delving into minutiae like a Soviet solder’s daily routine and diet. Yes—we knew our enemy.