Get a Pentest and security assessment of your IT network.

News

4 things you can do to minimize cyberattacks on supply and value chains

Supply chain attacks target the weakest spot in most every enterprise’s security program: third-party access. The SolarWinds Orion hack was accompanied by forged SAML tokens that provided unauthorized access to enterprise resources without detection. Centrally-manage all third party identities is imperative to centrally manage all third parties’ access. Access certification processes are key to an identity governance program, requiring approvers, sponsors and other certifiers to verify and attest that users have the right access and permissions. This verification process could also lead to detecting a supply chain attack.

Source: https://www.helpnetsecurity.com/2021/04/08/minimize-supply-chain-cyberattacks/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Reflection of cyber-attack to Wells Fargo in world media

News

CVE-2016-6563 RCE flaw affects D-Link Routers, disable remote admin