Software supply chain attacks – everything you need to know
Thursday, February 11, 2021
As well as being discerning when sourcing new suppliers, organizations should close down redundant infrastructure.
“People have shadow IT or abandoned servers, systems, or applications accessible from the internet for a variety of reasons, whether it is [down to] human negligence, carelessness, or forgetfulness,” Ilia Kolochenko, CEO of ImmuniWeb, told The Daily Swig.
And CIOs should move away from blindly trusting the software they buy, build, and use. Read Full Article
CSO: Supply chain attacks show why you should be wary of third-party providers
Data Center Knowledge: What are Supply Chain Attacks, and How to Guard Against Them