Blog Contact Us Partner Portal
CC logo blue
    • CimTrak Platform
      • FIM
        File Integrity Monitoring
      • Automated-Hardening
        Automated System Hardening
      • Trusted-File-Registry
        Trusted File Registry
      • Zero-Trust
        Zero Trust
      • System-Integrity
        System Integrity
      • Compliance
        Compliance
      • Compliance-&-Config
        Compliance + Config Remediation
    • Solutions
      • By Use Case

      • Ransomware
      • Zero-Day Attacks
      • Risk Mitigation
      • Workflow + Reporting
      • Compliance
      • All Use Cases
      • By Industry

      • Healthcare
      • Government
      • Financial Services
      • Energy
      • Retail
      • All Industries
    • Why Cimcor
      • Industry Recognition
      • Customer Success Stories
      • CimTrak vs Competition
      • Integrations
      • Support Platforms + Benchmarks
      • Certifications
    • Resources
      • Blog
      • News
      • Podcasts
      • Webinars
      • Resource Library
      • Upcoming Events
    • Pricing
      • Instant Preview
      • Free Trial
      • Custom Demo
  • Free Trial
      • FIM
        File Integrity Monitoring
      • Automated-Hardening
        Automated System Hardening
      • Trusted-File-Registry
        Trusted File Registry
      • Zero-Trust
        Zero Trust
      • System-Integrity
        System Integrity
      • Compliance
        Compliance
      • Compliance-&-Config
        Compliance + Config Remediation
      • By Use Case

      • Ransomware
      • Zero-Day Attacks
      • Risk Mitigation
      • Workflow + Reporting
      • Compliance
      • All Use Cases
      • By Industry

      • Healthcare
      • Government
      • Financial Services
      • Energy
      • Retail
      • All Industries
      • Industry Recognition
      • Customer Success Stories
      • CimTrak vs Competition
      • Integrations
      • Support Platforms + Benchmarks
      • Certifications
      • Blog
      • News
      • Podcasts
      • Webinars
      • Resource Library
      • Upcoming Events
      • Instant Preview
      • Free Trial
      • Custom Demo
  • Blog Contact Us Partner Portal
  • Free Trial

Software Supply Chain Attacks: How Did We Get Here?

Lauren Yacono
by Lauren Yacono
on March 29, 2022

Over the last decade, software supply chain attacks have become increasingly more sophisticated—and more damaging.

Read More

Posts about System Integrity Assurance (2)

March 15, 2022 • 3 min read
Is the U.S. Learning From Software Supply Chain Attacks?
By Lauren Yacono
February 15, 2022 • 4 min read
Have Regulations Made the US Safer From Software Supply Chain Attacks?
By Lauren Yacono
January 06, 2022 • 3 min read
FTC Log4j Recommendation: Be Proactive
By Lauren Yacono
December 02, 2021 • 3 min read
The #1 Compliance Problem Nobody’s Talking About
By Lauren Yacono
October 21, 2021 • 3 min read
Top 3 Reasons Security and Compliance Are Going The Wrong Way
By Cimcor

Subscribe to Email Updates

Posts by Topic

  • Cybersecurity (121)
  • File Integrity Monitoring (62)
  • Compliance (49)
  • Zero Trust (34)
  • News (31)
  • System Integrity Assurance (16)
  • CyberAttack (13)
  • Cybercrime (9)
  • System Hardening (7)
  • Next-Gen File Integrity Monitoring (4)
  • Ransomware (4)
Prev 1 2 All
CC logo blue
Get Started
  • Pricing
  • Free Trial
  • Custom Demo
  • Technical Summary
Company
  • About Cimcor
  • Leadership
  • Newsroom
  • Careers
Partners
  • Partner Program
  • Partner Portal
  • Find a Partner
  • Strategic Partners
  • Become a partner
Support
  • Call 1-877-424-6267
  • Contact Us
  • Technical Support
  • Schedule a Meeting

Copyright © 2026 Privacy