The SolarWinds attack took everyone by surprise. Even more ominous, it exposed a giant, gaping hole in cybersecurity as a whole. It begs the question: just how vulnerable are we? Organizations, institutions, governments, enterprises and critical infrastructure alike have been reeling from this remote code execution exploit, a type of attack that until now has only existed on the periphery.
Current security solutions rely on knowledge of past malware to form signatures or behavioral profiles of what might happen next. End point protection and threat hunting won’t identify unique malware that already exists in your system.
Satya Gupta, Virsec CTO and Co-Founder, digs into the dirty details about the SolarWinds attack; re-creating what happened, diagnosing what went wrong, and more importantly, how to prevent it from happening again. Watch a live demo, ask questions, and get best practices for how to protect against future or ongoing remote code exploitation attacks.