all InfoSec news
The Analyst Prompt #15: Network Environment-Focused Conversations Needed in Approaches to Cyber Security
Security Boulevard securityboulevard.com
Exploit Tools and Targets: Enhance Third-Party Risk Management to Mitigate Multi-Targeted Approach
Third-party attacks, or supply chain attacks, occur when a trusted software, vendor, or other external company property or personnel is the victim of a cyber-attack that may directly impact the partnered organization (1). One of the most recent and notorious third-party attacks was the SolarWinds compromise, which allowed access to commercial and government data through network security software. The malicious activity, which was initially discovered by …
analyst corporate cyber cyber security environment intelligence research malware network quantum computing security supply chain threats and vulnerabilities vulnerabilities