CrowdStrike and Supply Chain Risk Management—What Can we Learn From this Experience?
Wow, how much technology has changed in the past 15 years? I remember when “vendor” reviews were uncommon, technology was hosted in-house in 95% of...
Unless you had a really secluded and long holiday vacation, you’ve probably heard about the SolarWinds breach and how it has affected many US industries including financial institutions and their supply chains. Chances are even if your institution does not use it some of your vendors use it and were impacted.
Last week, we posted an article covering some of the immediate and longer term steps to improve your resiliency from this and any future supply chain attacks. To follow up on this story, here’s a breakdown of what we understand this unprecedented attack entailed, in a possibly over-simplified nutshell. Details continue to be discovered and shared so please keep in mind this is a point in time assessment.
If you need more information, we recommend the sources below and as well as the alerts updates such as those offered by the CISA at https://www.cisa.gov/supply-chain-compromise. We are continuing to monitor the developments of this compromise and capture the lessons it has to offer. If you need help or want to improve your security program for 2021, we would love to help! Contact us as support@bedelsecurity.com.
Sources:
https://www.fireeye.com/blog/threat-research/2020/12/sunburst-additional-technical-details.html
https://krebsonsecurity.com/2020/12/vmware-flaw-a-vector-in-solarwinds-breach/
Mitigating Supply Chain Attacks
https://www.bedelsecurity.com/blog/mitigating-supply-chain-attacks
The Scare of Miscellaneous Errors
https://www.bedelsecurity.com/blog/the-scare-of-miscellaneous-errors
The Virtual CISO Whitepaper
https://www.bedelsecurity.com/the-virtual-ciso-whitepaper
The Most Underrated Control in Information Security
https://www.bedelsecurity.com/blog/the-most-underrated-control-in-information-security
IT Risk Assessment vs. Vendor Risk Assessment Simplified
https://www.bedelsecurity.com/blog/it-risk-assessment-vs.-vendor-risk-assessment-simplified
Wow, how much technology has changed in the past 15 years? I remember when “vendor” reviews were uncommon, technology was hosted in-house in 95% of...
Ransomware has become more common in the past year with the hackers constantly changing tactics, such as moving from infecting backups to deleting...