Dangers of software supply chains

B2B Cyber ​​Security ShortNews

Share post

The software landscape continues to grow, and so it is not surprising that the vulnerabilities and attack surfaces of software libraries are not getting smaller.

Software supply chain attacks are particularly attractive to threat actors because, if successful, they can gain access to hundreds or thousands of applications with just one attack. Exploiting vulnerabilities or compromising source code in trusted applications can allow an attacker to operate from a central location and move around the network undetected.

Various solutions for this threat vector are being researched, and the “Secure by Design” initiative promoted by CISA plays an important role. The focus is on a proactive approach and should require manufacturers to only produce software and technology products that meet certain security standards. This should
reduce consumer responsibility and establish a safety culture that is built in from the installation of a new software or hardware solution. This isn't just about corporate software, but also about private network devices
and consumer software.

Data-driven security analysis

The broad availability of AI technologies, which will become increasingly important for technology developers and political decision-makers in the next few years, also plays a crucial role in this context.
It is important to ensure that AI is used in a way that protects privacy and intellectual property, but also that AI models are developed responsibly and ethically to protect against risks and misuse. With this in mind, AI can be used in extremely powerful ways to improve security.

Protecting personal data is a responsibility that every company has towards its customers, employees and investors. To ensure this, the common security checklists should be abandoned and replaced by results-based
and data-driven risk analysis. Companies must take the recommendations of security leaders seriously and view investments in security as essential to the longevity of their business. A data-driven one
Third-party security analysis and evidence of ongoing, regular monitoring of the security situation should be provided transparently between partners and customers. Investments in multi-layered detection and defense mechanisms are important steps, but still do not guarantee complete protection.

More at Tanium.com

 


About Tanium

Tanium, the industry's only Converged Endpoint Management (XEM) provider, is leading the paradigm shift in traditional approaches to managing complex security and technology environments. Only Tanium protects every team, endpoint, and workflow from cyber threats by integrating IT, compliance, security, and risk into a single platform. The Tanium platform provides comprehensive visibility across all devices, a unified set of controls, and a common taxonomy.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more