You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I understand you included, Supply chain compromise T1195.002, to address supplier software compromise and include vulnerability management mitigations, just like at T1210. And AF-019, "scan the components on the network".
Unfortunately, threat agents are targeting privileged users (IT, suppliers, which maybe working remotely) to access internal networks and do lateral movement... If applications are not updated regularly or if there are not compensatory controls, the risk of compromise increases.
The text was updated successfully, but these errors were encountered:
I understand you included, Supply chain compromise T1195.002, to address supplier software compromise and include vulnerability management mitigations, just like at T1210. And AF-019, "scan the components on the network".
Unfortunately, threat agents are targeting privileged users (IT, suppliers, which maybe working remotely) to access internal networks and do lateral movement... If applications are not updated regularly or if there are not compensatory controls, the risk of compromise increases.
The text was updated successfully, but these errors were encountered: