RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’
The Last Watchdog
JUNE 3, 2022
It’s not difficult to visualize how companies interconnecting to cloud resources at a breakneck pace contribute to the outward expansion of their networks’ attack surface. Its function is to record events in a log for a system administrator to review and act upon. Related: Why ‘SBOM’ is gaining traction.
Let's personalize your content