Supply Chain Attack Fundamentals

Supply Chain Attack Fundamentals

Aug 29, 2024

Overview:
👉 Picture this: Your website included a 3rdparty component (such as a WordPress plug-in), and hackers used that as a backdoor to infiltrate your systems, which were secure on their own.

This is a supply chain attack.

Pollyfill[.]io attack is a recent example of this where 100,000 websites were impacted last month.

In this webinar, Vivekanand Gopalan (VP of Products - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) discuss strategy and tactics to protect your applications from supply chain attacks.

Key takeaways:

  • Understanding the what, why and how of supply chain attacks- Blocking malicious components by default- Identifying the attack surface through third-party components- Prevent man-in-the-browser attacks by monitoring JavaScript library/file updates for any malicious updates- PCI 4.0 compliance requirements on client-side protection for preventing web browser-based attacks
  • About Indusface:
  • Indusface is a leading application security SaaS company that secures critical Web, Mobile, and API applications of 5000+ global customers using its award-winning fully managed platform that integrates web application scanner, web application firewall, DDoS & BOT Mitigation, CDN, and threat intelligence engine.
  • Indusface has been funded by Tata Capital Growth Fund II. It is the only Cloud WAAP (WAF) Vendor with 100% recommendation for three consecutive years - Gartner® Peer Insights™ Voice of Customer. It is a “Great Place to Work” 2024 certified SaaS product company, is PCI, ISO27001, SOC 2, GDPR certified, and has been the recipient of many prestigious start-up awards, such as the Economic Times Top 25, NASSCOM DSCI Top Security Company, and Deloitte Asia Top 100.
  • ♨️ Start 14 days Free Trial - http://bit.ly/3XlovZt
  • 📰 Interested to read more about Client Side Protection: https://bityl.co/Rmgb
  • Website: www.indusface.com
  • #PCI #PCICompliance #SupplyChainAttack #ThirdPartyRisks #Vulnerabilities #XSS #CrossSiteScripting #OWASP #OWASPTop10 #CyberSecurity #ApplicationSecurity #AppSec #Indusface #AppTrana