Get a Pentest and security assessment of your IT network.

News

4 things you can do to minimize cyberattacks on supply and value chains

Supply chain attacks target the weakest spot in most every enterprise’s security program: third-party access. The SolarWinds Orion hack was accompanied by forged SAML tokens that provided unauthorized access to enterprise resources without detection. Centrally-manage all third party identities is imperative to centrally manage all third parties’ access. Access certification processes are key to an identity governance program, requiring approvers, sponsors and other certifiers to verify and attest that users have the right access and permissions. This verification process could also lead to detecting a supply chain attack.

Source: https://www.helpnetsecurity.com/2021/04/08/minimize-supply-chain-cyberattacks/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

A young hacker violated the CIA Directors private AOL email

News

Facebook Bug #4: Password Reset Vulnerability Found in www.facebook.com