All software supply chain attacks share a core trait in common: they allow threat actors to break into organizations’ IT estate by exploiting vulnerabilities in software created by other entities, not the business itself.
However, the types of vulnerabilities that attackers may exploit during supply chain incidents come in many forms. The exploitation methods that attackers use to execute supply chain incidents also vary. For these reasons, protecting your business against supply chain threats requires understanding the most common software supply chain attack paths and deploying a multi-pronged defense against all of them.
With that in mind, our Cloud Security Architect, Sai Krishna Kumar will walk through the common supply chain attack paths, compare and contrast the severity of each type of attack, and discuss best practices to prevent attack & vulnerabilities.