site logo

SolarWinds security to-do list post hack

One of the first changes security teams need to make is how they understand adversarial capabilities — always assume the perimeter has already been breached.

Photo illustration by Danielle Ternes/Utility Dive; photograph by ismagilov via Getty Images