The SolarWinds attack was not only an attack on the Software Supply Chain. It also had secondary consequences. To illustrate this, we will use the example of Microsoft Active Directory, the authentication technology utilized by most corporate networks, which was also affected by it. The goal of this example is to show how accommodating one […]
↧