Adapting Your Access and Security Playbook to Mitigate Risk While details are limited on the SolarWinds cyberattack, what does seem definite is that malicious software, injected into SolarWinds, opened a security hole to allow other malicious actions to be possible. A...