3rd Party Risk Management , Application Security , Cybercrime as-a-service

SolarWinds Attack: 'This Hit the Security Community Hard'

RiskIQ CEO Lou Manousos Details Lessons to Learn in Supply-Chain Attack Aftermath
Lou Manousos, CEO, RiskIQ

The SolarWinds breach is a case study in how attackers can subvert a widely used piece of software to turn it to their advantage, says Lou Manousos, CEO of RiskIQ.

See Also: NHS Ransomware Attack: Healthcare Industry Infrastructures Are Critical

“The magnitude of this attack is hard to overstate,” Manousos says. “Having a supply chain vendor like this - with a legitimate program that is trusted - used to carry out an attack, it’s just unprecedented.

”The number of organizations that have been hit, the types of organizations - some really advanced security programs - I think we’re all shocked to see how the traditional protection that has been put in place just wasn’t as effective as we would have liked when we have trusted software like this.”

In this video interview with Information Security Media Group, Manousos discusses:

  • The impact of the SolarWinds breach;
  • The response from the public and private sectors;
  • Lessons to learn from this attack.

Manousos is CEO and co-founder of RiskIQ. As CEO, he has spearheaded a new approach that helps internet, financial services, healthcare, media and consumer packaged goods companies protect their brands from online fraud. Manousos is a recognized expert in internet security and fraud prevention who has been developing and delivering enterprise protection technologies for more than 15 years.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.