Sponsored By

6 Tips for Limiting Damage From Third-Party Attacks

The ability to protect your organization from third-party attacks will become increasingly critical as attackers try to maximize the effectiveness of their malicious campaigns.

7 Slides

The breach disclosed by SolarWinds and another involving a legacy file transfer appliance from Accellion have focused fresh attention on the risks that enterprise organizations face from attacks via the software supply chain and other trusted third parties.

Both attacks impacted numerous organizations, targeting them for further exploit activity designed to steal data and establish a persistent presence on their networks.

Security experts expect such attacks will become more common as adversaries try to exploit vulnerabilities and weaknesses in widely deployed third-party products and services to target large swathes of their customers. Many concede that detecting attacks that exploit trusted third parties and supply chain partners will be hard -- but the ability to do so will become increasingly critical as attackers try to maximize the effectiveness of their malicious campaigns.

Here, according to several security experts, are measures organizations can implement to limit damage from attacks involving supply chain partners and other trusted third parties.

About the Author(s)

Jai Vijayan, Contributing Writer

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights