Supply Chain Attack Fundamentals

img

Picture this: Your website included a 3rdparty component (such as a WordPress plug-in), and hackers used that as a backdoor to infiltrate your systems, which were secure on their own.

This is a supply chain attack.  

Pollyfill[.]io attack is a recent example of this where 100,000 websites were impacted last month. 

In this webinar, join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they discuss strategy and tactics to protect your applications from supply chain attacks.

Watch the webinar now !

Indusface
Indusface

Indusface is a leading application security SaaS company that secures critical Web, Mobile, and API applications of 5000+ global customers using its award-winning fully managed platform that integrates web application scanner, web application firewall, DDoS & BOT Mitigation, CDN, and threat intelligence engine.


Key takeaways:

  • Understanding the what, why and how of supply chain attacks
  • Blocking malicious components by default
  • Identifying the attack surface through third-party components
  • Prevent man-in-the-browser attacks by monitoring JavaScript library/file updates for any malicious updates
  • PCI 4.0 compliance requirements on client-side protection for preventing web browser-based attacks