Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Stonefly. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Stonefly or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

From SolarWinds to Code Breaches: The Rise of Supply Chain Attacks

22:19
 
Share
 

Manage episode 470008744 series 3642513
Content provided by Stonefly. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Stonefly or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Supply chain attacks have become one of the most dangerous cybersecurity threats, targeting software vendors, IT providers, and critical infrastructure to infiltrate thousands of organizations at once. In this episode, we break down how attackers compromise trusted software, manipulate dependencies, and inject malware at the source—turning routine updates into Trojan horses.

We explore major real-world incidents like SolarWinds, Kaseya, and Log4j, demonstrating how even the most secure enterprises can fall victim when a trusted vendor is compromised. Learn how modern supply chain attacks exploit third-party software, open-source dependencies, and hardware vulnerabilities to bypass traditional security measures.

More importantly, we discuss how businesses can defend against these attacks with proactive security measures like zero-trust frameworks, code integrity checks, air-gapped backups, and continuous monitoring. Featuring insights from cybersecurity experts and real-world case studies, this episode is a must-listen for IT leaders, developers, and anyone concerned about securing their business from this growing cyber threat.

  continue reading

74 episodes

Artwork
iconShare
 
Manage episode 470008744 series 3642513
Content provided by Stonefly. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Stonefly or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Supply chain attacks have become one of the most dangerous cybersecurity threats, targeting software vendors, IT providers, and critical infrastructure to infiltrate thousands of organizations at once. In this episode, we break down how attackers compromise trusted software, manipulate dependencies, and inject malware at the source—turning routine updates into Trojan horses.

We explore major real-world incidents like SolarWinds, Kaseya, and Log4j, demonstrating how even the most secure enterprises can fall victim when a trusted vendor is compromised. Learn how modern supply chain attacks exploit third-party software, open-source dependencies, and hardware vulnerabilities to bypass traditional security measures.

More importantly, we discuss how businesses can defend against these attacks with proactive security measures like zero-trust frameworks, code integrity checks, air-gapped backups, and continuous monitoring. Featuring insights from cybersecurity experts and real-world case studies, this episode is a must-listen for IT leaders, developers, and anyone concerned about securing their business from this growing cyber threat.

  continue reading

74 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play