Red Hat will explore how to manage risk in the digital supply chain during Feb. 15 event

When one major breach technique becomes successful, it’s a sure bet that rapid adoption by threat actors will follow.
This maxim has become more evident following a successful attack on the software supply chain through a breach of SolarWinds Inc. more than one year ago. Software…
Source: siliconangle.com – Read more