Get a Pentest and security assessment of your IT network.

Cyber Security

4 things you can do to minimize cyberattacks on supply and value chains

Supply chain attacks target the weakest spot in most every enterprise’s security program: third-party access. The SolarWinds Orion hack was accompanied by forged SAML tokens that provided unauthorized access to enterprise resources without detection. Centrally-manage all third party identities is imperative to centrally manage all third parties’ access. Access certification processes are key to an identity governance program, requiring approvers, sponsors and other certifiers to verify and attest that users have the right access and permissions. This verification process could also lead to detecting a supply chain attack.

Source: https://www.helpnetsecurity.com/2021/04/08/minimize-supply-chain-cyberattacks/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security