Software supply chain threats present significant risks—discover ways to strengthen your defenses

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Key Findings on Supply Chain Attacks

  • 65% of organizations encountered supply chain attacks in the last year.
  • GenAI adoption heightens risks; merely 24% assess AI-generated code for security and intellectual property concerns.
  • Enhanced compliance and continuous automation expedite remediation and bolster defense effectiveness.

The software supply chain—encompassing a complex web of components, tools, and processes utilized in software development, construction, and distribution—has unexpectedly emerged as a prime target for cybercriminals.

This trend allows malefactors to circumvent traditional defenses, yielding disproportionate gains from isolated breaches.

This insight is drawn from the comprehensive report titled “Navigating Software Supply Chain Risk in a Rapid-Release World,” produced by the application security firm Blackduck.

Drawing on a survey of 540 software security authorities, the report reveals that a significant two-thirds (65%) of organizations have suffered at least one supply chain assault within the preceding twelve months.

Importance of Compliance

These attacks are increasingly nuanced, with reports indicating malicious dependencies (30%), unaddressed vulnerabilities (28%), zero-day exploits (27%), and malware infiltrations into build pipelines (14%).

The accelerating adoption of Generative Artificial Intelligence (GenAI) in enterprises exacerbates these challenges. Blackduck notes that a staggering 95% of organizations now employ AI tools, predominantly ChatGPT, for software development, yet security protocols lag woefully behind. While there is considerable confidence in these tools, the actual validation rates are disconcertingly low.

Alarmingly, only 24% of organizations subject AI-generated code to scrutiny for issues pertaining to intellectual property, licensing, security, or quality.

According to the report, this oversight leaves ample opportunity for vulnerabilities to infiltrate the supply chain, potentially resulting in the unintentional introduction of copyrighted intellectual property or the exposure of sensitive API keys.

In fortifying defenses, adherence to compliance emerges as paramount. Blackduck asserts that, counter to common perceptions, a compliance-centric methodology not only enhances security but also accelerates response times.

There appears to be a distinct connection between stringent compliance measures and the velocity of remediation efforts.

Hackers Evade EDR Protection by Using a Malicious File as an In-Memory PE Loader

Organizations implementing at least four distinct compliance controls respond to critical vulnerabilities with greater swiftness, with 54% accomplishing this in contrast to 45% among the general survey respondents.

Moreover, the necessity for automation cannot be overstated. Reliance on intermittent manual monitoring, a practice currently adopted by approximately 36% of respondents, is broadly deemed inadequate. Organizations employing automatic continuous monitoring are classified as “significantly more effective.”

Source link: Techradar.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading