The Cybersecurity and Infrastructure Security Agency released a forensics collection capability to help detect activity related to the supply chain compromises affecting SolarWinds and Active Directory/Microsoft 365.
CISA issues tool for detecting threat activity
March 19, 2021 / By ICBA
The Cybersecurity and Infrastructure Security Agency released a forensics collection capability to help detect activity related to the supply chain compromises affecting SolarWinds and Active Directory/Microsoft 365.
The Cybersecurity and Infrastructure Security Agency released a forensics collection capability to help detect activity related to the supply chain compromises affecting SolarWinds and Active Directory/Microsoft 365.
The CISA Hunt and Incident Response Program, or CHIRP, is an open-source project freely available to all stakeholders on CISA’s CHIRP GitHub repository.
Subscribe now
Sign up for the Independent Banker newsletter to receive twice-monthly emails about new issues and must-read content you might have missed.
Sponsored Content
Featured Webinars
Join ICBA Community
Interested in discussing this and other topics? Network with and learn from your peers with the app designed for community bankers.
Subscribe Today
Sign up for Independent Banker eNews to receive twice-monthly emails that alert you when a new issue drops and highlight must-read content you might have missed.
News Watch Today
Join the Conversation with ICBA Community
ICBA Community is an online platform led by community bankers to foster connections, collaborations, and discussions on industry news, best practices, and regulations, while promoting networking, mentorship, and member feedback to guide future initiatives.