Advertisement

Security News

12 Lessons Learned From The SolarWinds Breach: RSA Conference

Michael Novinson

From scrutinizing technology suppliers and code used during the application development process to axing on-premise Active Directory, here are 12 key takeaways from the SolarWinds breach.

A Breach Unlike Any Other

The SolarWinds breach rocked the cybersecurity world, with nine U.S. government agencies and roughly 100 private sector organizations compromised through a poisoned update to the company’s Orion network monitoring software. The colossal campaign was carried out by the Russian foreign intelligence service (SVR), and proved that even elite security and technology firms could be compromised.

Nearly 18,000 organizations downloaded versions of Orion between March and June 2020 where Russian hackers had injected malicious code, though the SVR only took advantage of the access they had gained in select cases. It wasn’t until FireEye was compromised on Dec. 8, 2020, and traced the hacker’s initial intrusion back to a server running SolarWinds Orion that the entire campaign came to light.

CRN spoke with 12 prominent C-suite executives at RSA Conference 2021 about the biggest lessons learned from one the most infamous cyberattacks of all-time. From applying far greater scrutiny to technology suppliers and code used during the application development process to eliminating the use of on-premise Microsoft Active Directory, here are 12 major takeaways from the SolarWinds breach.

 
Learn More: Cybersecurity
Advertisement
Advertisement
Sponsored Post
Advertisement

NEWSLETTER

Advertisement