Cyberattacks often target an enterprise’s use of software for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of data or stealing controlled information. Many well-known attacks have exploited vulnerabilities and weaknesses in software and within software supply chains; an issue that spans both proprietary and open source software, which impacts both private sector and government enterprises.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | Cybersecurity and Infrastructure Security Agency (CISA) |
Published: | August 1, 2024 |
License: | Public Domain |