The SolarWinds compromise showed that supply-chain attacks are possible and the ramifications can be tremendously impactful. Other nation states will be investing in efforts to duplicate this success. That makes IT tools, security products, hardware & firmware vendors, and cloud service providers prime targets for exploitation.
Cybersecurity processes, solutions, and efficiencies must adapt to prevent and rapidly detect similar methods of supply-chain attacks.

- Top
- New
- Conversational
COMMUNITY DETAILS
Cybersecurity and Privacy
5306
Subscriber
1
Online
Cybersecurity is intertwined with our digital world. It impacts cryptocurrencies, social media, technology innovation, software, privacy, and even our safety. Abuse, hacking, theft, fraud, and data breaches are real threats. Digital transformation is changing our world, connecting and enriching the lives of everyone but there is an accompanying set of risks for all those benefits. Cybersecurity and Privacy underpins the trust of digital innovation, including cryptocurrency. As a community, let's stay aware of the risks, threats, and current attacks.