Incident Response
Incident Response Playbook for Supply Chain Attacks
Supply chain attacks break your standard IR playbook. The compromise originates outside your perimeter, affects trusted software, and the blast radius is unknown. Here's how to adapt.
Nov 28, 20229 min read