They are a tiny tiny fraction of compromises but how do you “fix” software supply chain attacks? I know they’re downstream of another compromise, typically something easier to stop but…

Comments