Today with international sourcing, the mixture of proprietary and open-source code, and enormous variability in vendor practices, perfectly securing the enterprise supply chain borders upon the impossible.
The list of supply chain attacks is long and infamous, and, of course, this applies to hardware as well – peripherals, networking equipment, and IoT devices. But in the end, the commonality to all IoT devices and supply chain attacks is the compromise of credentials and authentication, followed by abuses of network privileges in proliferation and spread.
The infamous SolarWinds supply chain cyberattack in December 2020 was devastating not only because of its reach — extending to at least nine federal agencies, critical infrastructure entities, and more than 100 private sector organizations. Its sophisticated strategy made it virtually invisible unless you had tools to uncover user behavior.
In this webinar we will uncover:
Senior Product Marketing Manager, Exabeam