Supply Chain Attacks Explained – What is a Supply Chain Attack? How do Supply Chain Attacks Work? | What you need to know about Supply Chain AttacksIn this e...
In this episode we are going to talk about Supply Chain Attacks. Whether you talk about Solarwinds, Codecov, Ccleaner or the Ukrainian accounting software MEDoc, Supply Chain attacks are on the rise. Supply chain attacks are scary because they're really hard to deal with, and because they make it clear you're trusting every vendor whose code is on your machine, and you're trusting every vendor's vendor. Believe it or not supply chain attacks were first demonstrated around four decades ago, when Ken Thompson, one of the creators of the Unix operating system, wanted to see if he could hide a backdoor in Unix's login function.
The goal of this video is to help you understand What supply chain attack means along with the different types that exist.
This way you can
A) Have a reference to check your own systems and processes to see whether or not your current plan and working mode has any vulnerabilities to these types of attacks
B) So that you can read about these attacks and be able to spot the type yourself
Visit Our Website:- https://www.youtube.com/watch?v=6HLOknSWxxc