Research from ESET of a supply chain attack in Vietnam in which digital certificates were compromised set off continued discussions in the industry about the nature of recent supply chain attacks, and how security teams can most effectively prepare and respond.
Almost all security researchers agree that more of them will happen – especially attacks on the software development lifecycle – and that security teams need to sharpen their strategies.
In its broadest sense, supply chain or third-party attacks stem from risks involving a business partner, vendor, or supplier with which an organization maintains a business relationship. Supply chain risks can vary greatly – from outsourced managed security services being hit with ransomware and the bad threat actors using the connectivity between the managed services company and their clients to infect additional organizations, to a trusted software provider getting attacked and passing along infected code into multiple organizations, like the SolarWinds case.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.