As cyber threats have evolved over time, the risks from newer generations of attacks are real for organizations and their supply chains. Early attacks in the 1980s used viruses spread through floppy disks, leading to anti-virus solutions, while attacks in the 1990s spread over the internet, requiring firewalls. By the 2000s, attackers exploited software vulnerabilities and used botnets, prompting intrusion prevention. Now, generations five and six bring risks through highly connected networks and IoT devices, threatening business models and use of data analytics through multi-vector, large scale attacks.