The SolarWinds breach represents a tectonic shift in threat actor tactics, suggesting this kind of attack vector will be replicated. Not only were the attacker’s sophistication and technical proficiency high — allowing them to stay in stealth mode — they also understood the supply chain. Join us to learn how improved identity management and governance surrounding software components, along with workload runtime protection, are critical strategies in guarding against attacks like SolarWinds.

You May Also Like

China deploys cyber spying campaign targeting public and private organizations in the US

A few weeks ago a group of researchers in the West detected…

Poly Network hackers return millions of dollars in stolen cryptocurrency; they claim they don’t care about money

Just a few hours ago the heads of the Poly Network platform…

Someone stole $625 million USD hacking the ‘Axie Infinity’ blockchain; they noticed it a week later

Information security reports indicate that Ronin, the blockchain behind the popular NFT…