Oct. 10, 2023, 3:34 p.m. | SC Staff

SC Magazine feed for Policy www.scmagazine.com

Recent mass cyberattacks that exploited vulnerabilities in software such as MOVEit, Log4j and SolarWinds Orion have served as prime examples of why companies must extend their zero-trust policies to third-party users, devices and infrastructure.

author companies cyberattacks devices exploited exploited vulnerabilities infrastructure log4j moveit orion party policies prime security-staff-acquisition-development software solarwinds solarwinds orion third third-party trust vulnerabilities

More from www.scmagazine.com / SC Magazine feed for Policy

Principal Engineer - DLP Endpoint Security

@ Netskope | Bengaluru, Karnataka, India

Security Consultant (m/w/d)

@ Deutsche Telekom | Berlin, Deutschland

Security Engineer

@ IDEMIA | Haarlem, NL, 2031 CC

CyberSecurity Forensics and Incident Response Analyst

@ Bosch Group | Pittsburgh, PA, United States

Cyber MS MDR - Sr Associate

@ KPMG India | Bengaluru, Karnataka, India

Senior Lead Cybersecurity Architect-Threat modeling, Cryptography

@ JPMorgan Chase & Co. | India