Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    How to run RAG projects for better data analytics results

    October 13, 2025

    MacBook Air deal: Save 10% Apple’s slim M4 notebook

    October 13, 2025

    Part 1 – Energy as the Ultimate Bottleneck

    October 13, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Check your risk blind spot
    IT/ Cybersecurity

    Check your risk blind spot

    big tee tech hubBy big tee tech hubAugust 16, 2025005 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Check your risk blind spot
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?

    Tony Anscombe

    12 Aug 2025
     • 
    ,
    4 min. read

    Supply-chain dependencies: Check your resilience blind spot

    A panel discussion at DEF CON 33 last week, titled “Adversaries at war: Tactics, technologies, and lessons from modern battlefields”, offered several thought-provoking points, as well as a clear takeaway: while digital tactics such as misinformation and influence campaigns are useful in modern conflict, they are not going to win a war. That’s because when bombs start dropping and the physical elements of war are under way, the misinformation spreading through digital channels becomes less important. Understandably, the victims of conflict and those displaced have more urgent priorities: food, shelter and staying alive.

    Turning the conversation to whether a war could be won using cyberattacks and digital disruption, there was also agreement among the panelists that cyberattacks create temporary damage, whereas a bomb landing on something is a more effective and lasting method of destruction.

    The attacks against critical infrastructure in Ukraine potentially confirm this: Russia-aligned actors have launched numerous cyberattacks against the country’s power grid, resulting in temporary disruptions as systems can be rebuilt and made operational again in a relatively short period of time. Meanwhile, a bomb landing on a power facility is likely to cause long-term damage and limitation of service that could take months or years to restore. The big-picture conclusion on this part of the panel discussion is that a war cannot be won by cyber alone – it still needs to be won on the physical battlefield.

    Cyber and physical security

    The discussion then evolved to how cyber affects the physical. One panelist made the comment to the effect that “an army can’t fight if they have not been fed”. Put differently, as a growing number of civilian contractors are being used to provide the logistics needed to operate an army, making the attack surface broader than it may appear.

    The panel used Taco Bell as a fictional analogy. A hacker could claim they modified the water supply in Taco Bell, but on closer inspection it could just be that they have tampered with a restaurant’s water cooler, which would not be enough to affect its operations.

    However, a cyberattack on Taco Bell’s supply chain could bring it to an operational stop. How? By stopping deliveries of produce to the restaurant. This dependency could be even more obscure: an attack on the companies that supply the meat used in Tacos could potentially cause Taco Bell to cease operations due to a lack of ingredients for meals. The analogy holds true for the military: without food, the troops can’t fight or are, at best, limited.

    What this means for your business

    Moving beyond the panel discussion, this raises a critical question for businesses: do they really understand their dependencies to be operationally resilient? Do they understand the dependency their customers have on them to ensure the continued operation of their own businesses?

    Sticking with the Taco Bell analogy, imagine a cyberattack that takes away a key element the business needs to operate; for example, if the company relies on a supplier for taco seasoning, then a cyberattack against the supplier could affect Taco Bell’s ability to keep operating. This isn’t mere speculation – there are real-world examples of cyberattacks that have caused this type of disruption. For example, the cyber-incident suffered by Change Healthcare, a health data processing firm, stopped medical services being provided across practices and hospitals.

    Today, as far as I know, cybercriminals only extort payment from those they directly attack. But what if a cybercriminal decided to attack the third party and then demand an extortion payment from all the businesses that rely on that supplier? In my example, say the taco seasoning company is disrupted by ransomware, and while the cybercriminal may ask the seasoning company to pay a demand directly, they may actually gain more if they requested payment from all the companies reliant on the supplier’s product, as a lack of supply may cost them more than the supplier itself.

    While this monetization strategy may seem speculative, there is an important point here: does your business truly understand its dependencies and how to mitigate the risk of attack on those it’s dependent on? A real-world example might be an attack on a catering company that is contracted to feed patients in a hospital. If the ability to feed patients is disrupted due to a cyberattack, then the hospital may have to declare a major incident and close admissions to new patients. In this scenario, would the hospital pay an extortion demand that brings back catering supply?

    The key takeaway from this panel session for me is this: we all need to map and fully understand the dependencies we rely on and ensure we have resilience where needed. If we can’t get to a point of resilience, then we at least need to understand the risk posed by the dependencies.



    Source link

    blind Check Risk Spot
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Inside the ‘Let’s Break It Down’ Series for Network Newbies

    October 13, 2025

    Trustwave Named a Leader in the IDC MarketScape:

    October 12, 2025

    WhatsApp Worm Targets Brazilian Banking Customers – Sophos News

    October 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    How to run RAG projects for better data analytics results

    October 13, 2025

    MacBook Air deal: Save 10% Apple’s slim M4 notebook

    October 13, 2025

    Part 1 – Energy as the Ultimate Bottleneck

    October 13, 2025

    From Static Products to Dynamic Systems

    October 13, 2025
    Advertisement
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    How to run RAG projects for better data analytics results

    October 13, 2025

    MacBook Air deal: Save 10% Apple’s slim M4 notebook

    October 13, 2025

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2025 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.