The SolarWinds breach represents a tectonic shift in threat actor tactics, suggesting this kind of attack vector will be replicated. Not only were the attacker’s sophistication and technical proficiency high — allowing them to stay in stealth mode — they also understood the supply chain. Join us to learn how improved identity management and governance surrounding software components, along with workload runtime protection, are critical strategies in guarding against attacks like SolarWinds.

You May Also Like

Cybercriminals hack Fortress Protocol, steal its funds and launder them through Tornado Cash

Fortress Protocol, an algorithmic marketplace platform and decentralized finance (DeFi) lending protocol,…

How Russian created a deepfake video of Ukrainian president Volodymyr Zelenskyy telling its citizens to lay down arms

During the latest hours, a deepfake video in which Ukrainian President Volodymir…

California Pizza Kitchen restaurant chain hacked. Confidential data leaked

California Pizza Kitchen (CPK), a popular restaurant chain in the U.S., revealed…

Massive data breach affects millions of T-Mobile customers; information for sale on dark web

Security teams at telecommunications firm T-Mobile are investigating a data breach after…