Sign in to view the whitepaper

Assessing and Migrating Software Vendor Risk

The SolarWinds breach provides a useful reminder that modern adversaries, both cybercriminals and hostile state-actors, continue to innovate and evolve in sophistication, guile, and persistence. They are using the same advanced
tools in the development of their attacks – heuristics, machine learning, artificial intelligence, increased integration, and automation – as legitimate tech vendors and service providers are using to defend their businesses and customers. It is a battle in which attackers generally have a first-mover advantage: it is easier to attack than it is to detect, contain, terminate, and recover from an attack.

Implementing a full-bore ISO/IEC or NIST security framework is often beyond the needs and resources of many MSPs, but the philosophy behind them can still useful. They provide a proven vocabulary and methodology for managing cybersecurity risk. By starting with these basic questions, you can start down the path of systematically identifying and mitigating your software supply-chain security risk. A framework-based mindset can help you to identify areas where existing processes can be strengthened and new processes implemented, as well as prioritize your security requirements and set appropriate expectations with your suppliers and partners.

  •   By downloading this content, you expressly consent to a representative of Acronis communicate with you (by phone or email) regarding the content.
    Acronis Privacy Policy

  •  

These reports are brought to you through Info-tech.Vision – a social network and library of technology content for technology businesses, professionals and decision makers.

Subscribe to our weekly Newsletter. info-tech.vision

© 2022 info-tech.vision. All rights reserved | Privacy Policy

Translate »