Member-only story

Finding the Next SolarWinds Type of Supply Chain Attack

--

The SolarWinds compromise showed that supply-chain attacks are possible and the ramifications can be tremendously impactful. Other nation states will be investing in efforts to duplicate this success. That makes IT tools, security products, hardware & firmware vendors, and cloud service providers prime targets for exploitation.

Cybersecurity processes, solutions, and efficiencies must adapt to prevent and rapidly detect similar methods of supply-chain attacks.

--

--

Matthew.Rosenquist
Matthew.Rosenquist

Written by Matthew.Rosenquist

CISO and cybersecurity Strategist specializing in the evolution of threats, opportunities, and risks in pursuit of optimal security

No responses yet