site logo

SolarWinds security to-do list post hack

One of the first changes security teams need to make is how they understand adversarial capabilities: Always assume the perimeter has been breached.

Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images