Digital supply chain security has become a crucial topic for enterprises, especially during Cybersecurity Awareness Month. While cyberattacks may have been viewed as benign years ago, today’s organized criminals and nation-states have realized that cyberattacks can scale when they infiltrate an organization’s crown jewel data.
That infiltration can involve extracting ransoms, exfiltrating trade secrets or causing significant damage. Attackers have a wide variety of techniques they can use, according to JR Balaji (pictured, left), director of product management of security and manageability at Dell Technologies Inc.
“I always refer everybody to the MITRE ATT&CK technique. There are constantly techniques being added to that. Most organizations tend to focus on popular techniques like phishing, ransomware [and] credential theft,” Balaji said. “They are very popular and therefore top of mind for most IT and security organizations. But the reality is that adversaries can use any combination of techniques to breach organizations.”
Balaji and Patrick Bohart (right), director of marketing at Intel Corp., spoke with theCUBE Research’s Dave Vellante…