How to avoid another SolarWinds, Log4j, and XZ Utils situation

Organizations concerned about software supply chain attacks should focus on role-based access control, system monitoring, and boundary protection, according to a new preprint paper on the topic.…