Remove Authentication Remove Data collection Remove Knowledge Base Remove Libraries
article thumbnail

RSAC insights: SolarWinds hack illustrates why software builds need scrutiny — at deployment

The Last Watchdog

I had assumed that they either stole or spoofed a SolarWinds digital certificate, which they then used to authenticate the tainted update. This level of granular scrutiny, oriented to flushing out coding that shouldn’t be there, can be done thanks to advances in data collection and data analytics.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

So while I'm not going to log in as root or admin on the bottom for a lot of those kinds of scenarios, I absolutely help our clients understand based upon industry knowledge based upon what we see, etc. VAMOSI: That’s on the data collection side. This is what you should be concerned about. These are becoming.