Question 4 of 10Pro Only
Supply chain attacks have become increasingly sophisticated. How would you design a threat hunting operation to detect a potential software supply chain compromise in your environment?
Sample answer preview
Supply chain attacks represent one of the most challenging threats to detect because the malicious code arrives through trusted channels, often embedded within legitimate software updates from vendors the organization already trusts.
supply chain attackSolarWindssoftware integritybehavioral baselineprocess anomaliesupdate verification