Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2026 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

Solarwinds Sunbursts a Supernova: Early lessons learned

December 22, 2020 By Michael Kavka Leave a Comment

There will be more fallout from Solarwinds to come. More companies will realize they are compromised due to either SUNBURST or SUPERNOVA (got to love the catchy, similar style names).

The question is what are you and your company going to do about it? What have you and your company learned?

Do not just throw money at this. Vendors will start trying to use this as a marketing ploy, especially to those that do in house development. If you do in house development, work on getting your Secure Development Lifecycle (SDLC) better. Do not over promise and over push your developers. If developers say they need some extra time for security testing, understand it will save you more issues in the long run. Understand that meeting compliance check boxes will not mean that security was met.

The rest of the corporate world should be doing a few things starting with your people and processes. Make sure that your company has in place a solid detection process, which includes enough staff, proper logging, solid SIEM/SOAR rules and notebooks, and a solid Incident Response plan. If your company is lacking in any of these, and that includes keeping people trained, it will be money well spent in the long term. Your company will get breached at some point and these processes plus properly trained people will always be needed. There is no perfect security, so detection is as important if not more important.

Understand there is no magic bullet. Security is a process not a destination, and burned out, overworked security people (especially in the SOC) do your company no good. Compensating by getting more and more tools without enough staff will cause burnout. People can only do so much in any given time. Make sure they get time off, and that means not disturbing them when they are off, if possible.

These are the lessons every company should learn from this situation.

 

 

Filed Under: Rants, Security Tagged With: Security, Solarwinds, Sunburst, Supernova

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

RSS Taggart Institute Intel Feed

  • Palo Alto CEO says AI isn’t great for business, yet February 18, 2026 Simon Sharwood
  • ISC Stormcast For Wednesday, February 18th, 2026 https://isc.sans.edu/podcastdetail/9814, (Wed, Feb 18th) February 18, 2026
  • Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed February 18, 2026 Matt Kapko
  • China-linked snoops have been exploiting Dell 0-day since mid-2024, using 'ghost NICs' to avoid detection February 18, 2026 Jessica Lyons
  • Spain orders NordVPN, ProtonVPN to block LaLiga piracy sites February 17, 2026 Bill Toulas
  • Hsckers exploit zero-day flaw in Dell RecoverPoint for Virtual Machines February 17, 2026 David Jones
  • China remains embedded in US energy networks 'for the purpose of taking it down' February 17, 2026 Jessica Lyons
  • SCOTUS changed the rules for bringing cases to the court because John Roberts won't sell his stocks February 17, 2026 Chris Geidner
  • Flaws in popular VSCode extensions expose developers to attacks February 17, 2026 Bill Toulas
  • Password managers' promise that they can't see your vaults isn't always true February 17, 2026 Dan Goodin

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP