Supply Chain Attacks

May 12, 2021

Attacks like SolarWinds have revealed a hole in our defenses. With software updates on user machines, servers, and other portions of the network becoming a regular occurrence, a compromised update is a new and dangerous entry mechanism into your network.

It is imperative that SOC and Incident Response teams must begin to suspect software from external vendors as a point of entry when investigating security incidents on top of implementing zero-trust policies across the board.

In this webinar, you will have the opportunity to see a live investigation and mitigation of a live-fire supply chain attack, simulated on the cyber range included within Cyberbit.

View the video

    The information you provide will be used in accordance with the terms of our privacy policy.

    Experience Cyberbit for Yourself