Supply Chain Attack Fundamentals

Описание к видео Supply Chain Attack Fundamentals

Overview:
👉 Picture this: Your website included a 3rdparty component (such as a WordPress plug-in), and hackers used that as a backdoor to infiltrate your systems, which were secure on their own.
 
This is a supply chain attack.
 
Pollyfill[.]io attack is a recent example of this where 100,000 websites were impacted last month.
 
In this webinar, Vivekanand Gopalan (VP of Products - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) discuss strategy and tactics to protect your applications from supply chain attacks.
 
Key takeaways:
 
- Understanding the what, why and how of supply chain attacks- Blocking malicious components by default- Identifying the attack surface through third-party components- Prevent man-in-the-browser attacks by monitoring JavaScript library/file updates for any malicious updates- PCI 4.0 compliance requirements on client-side protection for preventing web browser-based attacks
 
About Indusface: 
 
Indusface is a leading application security SaaS company that secures critical Web, Mobile, and API applications of 5000+ global customers using its award-winning fully managed platform that integrates web application scanner, web application firewall, DDoS & BOT Mitigation, CDN, and threat intelligence engine.       
 
Indusface has been funded by Tata Capital Growth Fund II. It is the only Cloud WAAP (WAF) Vendor with 100% recommendation for three consecutive years - Gartner® Peer Insights™ Voice of Customer. It is a “Great Place to Work” 2024 certified SaaS product company, is PCI, ISO27001, SOC 2, GDPR certified, and has been the recipient of many prestigious start-up awards, such as the Economic Times Top 25, NASSCOM DSCI Top Security Company, and Deloitte Asia Top 100.       
 
♨️ Start 14 days Free Trial - http://bit.ly/3XlovZt 
📰 Interested to read more about Client Side Protection: https://bityl.co/Rmgb
 
Website: www.indusface.com 
#PCI #PCICompliance #SupplyChainAttack #ThirdPartyRisks #Vulnerabilities #XSS #CrossSiteScripting #OWASP #OWASPTop10 #CyberSecurity #ApplicationSecurity #AppSec #Indusface #AppTrana

Комментарии

Информация по комментариям в разработке