RSAC insights: SolarWinds hack illustrates why software builds need scrutiny — at deployment
The Last Watchdog
MAY 11, 2021
I had assumed that they either stole or spoofed a SolarWinds digital certificate, which they then used to authenticate the tainted update. They continue to rely on legacy defenses, i.e. the latest iterations of advanced firewalls, endpoint security, intrusion detection, intrusion prevent and data loss prevention systems, Pericin says.
Let's personalize your content