Remove Cloud Remove Government Remove Libraries Remove Systems administration
article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

It’s not difficult to visualize how companies interconnecting to cloud resources at a breakneck pace contribute to the outward expansion of their networks’ attack surface. Its function is to record events in a log for a system administrator to review and act upon. Related: Why ‘SBOM’ is gaining traction.