Finding the Next SolarWinds Type of Supply Chain Attack
The SolarWinds compromise showed that supply-chain attacks are possible and the ramifications can be tremendously impactful. Other nation states will be investing in efforts to duplicate this success. That makes IT tools, security products, hardware & firmware vendors, and cloud service providers prime targets for exploitation.
Cybersecurity processes, solutions, and efficiencies must adapt to prevent and rapidly detect similar methods of supply-chain attacks.
Posted with STEMGeeks
0
0
0.000
If there is one, the are probably many others. Need to create the skills and tools to find those needles in the haystack.
Where would VeChain fit in the grand scheme of things?