Classes from the SolarWinds assault on securing the software program provide chain

0
167

[ad_1]

CSO On-line | Could 19, 2021
The SolarWinds breach represents a tectonic shift in risk actor ways, suggesting this sort of assault vector will likely be replicated. Not solely had been the attacker’s sophistication and technical proficiency excessive — permitting them to remain in stealth mode — additionally they understood the availability chain. Be part of us to learn the way improved id administration and governance surrounding software program parts, together with workload runtime safety, are crucial methods in guarding towards assaults like SolarWinds.

Copyright © 2021 IDG Communications, Inc.

[ad_2]