![]() 60% of those directly impacted were still trying to determine if they were breached.63% of organisations surveyed remained highly concerned.But once details are released, it can be difficult and time-consuming to connect the dots and formulate answers.Ī case in point - months after the SolarWinds Orion security breach: Within minutes of these high-profile attacks making headline news, CEOs often ask: “Should we be concerned? How is it impacting us? What can we do to mitigate risk?”.Ĭhief information security officers (CISOs), and their teams on the front lines, need answers fast. SolarWinds, Codecov, and Kesaya have all been victims of such attacks that went on to impact thousands of downstream businesses around the globe. Over the past year, there has been a sharp rise in software supply chain attacks that infect legitimate applications to distribute malware to users. Article by ThreatQuotient APJC regional director Anthony Stitt. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |