Introduction This post is part one of a series that will be posted on the topic of “Software Supply Chain Exploitation”. With this post (Part 1), we start by providing a high level overview of Software Supply Chain Exploitation including historical case examples of exploitation and tools for exploitation. In [...]
Obscurity Labs security engineering past performance includes traditional enterprise IT environments, OT environments, cloud platforms, and embedded systems and Internet of Things (IoT). We have operated within a variety of industries/sectors/verticals within the public and private sector and we can easily integrate with your team. We have extensive experience with a multitude of risk and compliance frameworks and can implement security controls using control frameworks and solutions that make the most sense for your organization.