- RSA Conference 2024: Exploring our Current Cybersecurity Realities Amidst AI Myths
- RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations
- Europol Warns of Home Routing Challenges For Lawful Interception
- Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds
- Meta Faces Suspension of AI Data Training in Brazil
Lessons from the SolarWinds attack on securing the software supply chain
![](https://images.idgesg.net/images/article/2021/04/tc_vcmar_routh-100885035-large.3x2.jpg)
![](https://images.idgesg.net/images/article/2021/04/tc_vcmar_routh-100885035-large.3x2.jpg)
CSO Online | May 19, 2021
The SolarWinds breach represents a tectonic shift in threat actor tactics, suggesting this kind of attack vector will be replicated. Not only were the attacker’s sophistication and technical proficiency high — allowing them to stay in stealth mode — they also understood the supply chain. Join us to learn how improved identity management and governance surrounding software components, along with workload runtime protection, are critical strategies in guarding against attacks like SolarWinds.
Copyright © 2021 IDG Communications, Inc.