Logistics managers in high tech sectors face unique security challenges, say CompTIA analysts
With the global supply chain so fraught with uncertainty and instability, logistics managers should be examining where sole-source manufacturing suppliers are most vulnerable and how they can work with suppliers to identify and qualify alternate sites
Logistics in the NewsMay truck tonnage sees some gains but trends down due to tough annual comps, reports ATA Cass Freight Index reports more shipment and expenditures declines in May U.S. waterborne shipments are up in May, reports Panjiva DHL Supply Chain makes $150 million investment in U.S. pharmaceutical and medical network expansion U.S. rail carload and intermodal volumes are down for week ending June 8, reports AAR More Logistics News
Logistics ResourceTake Control of Your Supply Chain with Better Analytics Amber Road's eBook, Global Supply Chain Analytics, explores ways to improve current supply chain processes.
When RSA convened in San Francisco for its annual U.S. security conference last month, global logistics managers took a deep dive into risk mitigation and learned how to soften the impact of unexpected attacks to their firewalls.
But much of the emphasis was also placed on proactive prevention, with special emphasis placed on recognizing the “threat landscape” before investing in security architecture, systems, and personnel to avoid a crisis to begin with.
According to CompTIA – a leading technology industry association – logistics managers face “a three-fold” set of challenges, comprising an enlarged attack surface, well-armed adversaries, and the lack of in-house expertise to deal with sudden emergencies.
James Stanger, chief technology officer for CompTIA, says that a poll taken with 600 global companies confirmed that many still fail to anticipate cybersecurity trends.
“First, we’re seeing a proliferation of powerful devices and applications. Many of these have been created rather hastily,” he says. “Second, we’re seeing an increase in ever-more varied attacks that focus on social engineering, sophisticated credential harvesting and ways to manipulate foundational internet services…especially the Domain Name System (DNS).”
Stanger further maintains that when it comes to social engineering, this key problem remains: well-motivated, intelligent groups and individuals are actively targeting supply chains which are succumbing to these attacks with increasing regularity.
“It’s a huge number,” he says, something like 80 percent of these violations come for from ‘click users,’ or from employees who unknowingly give out too much information. In the early days of hacking, supply chains were wary of worms and software. Now it’s what we call ‘wetware’…people’s brains.”
It’s becoming increasingly complex, with more distant overseas suppliers being made vulnerable by failing to update their encryption or back up files.
“It’s not just ‘Nigerian Prince’ stuff anymore,” says Stanger. “Companies are being held up by ransomware rackets worldwide. The problem can even become more severe when the threats come from automated protocols that can’t even accept payment. That leaves the shipper with only one alternative…rebuild their network.”
About the AuthorPatrick Burnson, Executive Editor Patrick Burnson is executive editor for Logistics Management and Supply Chain Management Review magazines and web sites. Patrick is a widely-published writer and editor who has spent most of his career covering international trade, global logistics, and supply chain management. He lives and works in San Francisco, providing readers with a Pacific Rim perspective on industry trends and forecasts. You can reach him directly at
Subscribe to Logistics Management Magazine!Subscribe today. It's FREE!
Get timely insider information that you can use to better manage your entire logistics operation.
Warehouse Execution Systems (WES) Evolves Beyond “inside the four walls” Got labor? How supply chain companies are recruiting talent during a labor crunch View More From this Issue