Finding the Next SolarWinds Type of Supply Chain Attack

avatar

The SolarWinds compromise showed that supply-chain attacks are possible and the ramifications can be tremendously impactful. Other nation states will be investing in efforts to duplicate this success. That makes IT tools, security products, hardware & firmware vendors, and cloud service providers prime targets for exploitation.

Cybersecurity processes, solutions, and efficiencies must adapt to prevent and rapidly detect similar methods of supply-chain attacks.

Posted with STEMGeeks



0
0
0.000
2 comments
avatar

If there is one, the are probably many others. Need to create the skills and tools to find those needles in the haystack.

0
0
0.000
avatar

Where would VeChain fit in the grand scheme of things?

0
0
0.000