Lessons Learned Investigating the SUNBURST Software Supply Chain Attack
In the wake of the SolarWinds attack, organizations worked around the clock to understand the full extent of the damage. As security teams went back through historical records, it became clear that most logs were limited or incomplete, which created an issue for narrowing the timeline.
Download this report and learn how:
- Network data can be used to gain a more comprehensive understanding of the attack
- Insights into specific attack patterns cybercriminals use to move laterally within networks
- Our customers used network detection and response (NDR) to identify, investigate, and take swift action post-compromise
Brought to you by: