• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Fostering a secure developer experience

Allan Tan by Allan Tan
August 31, 2023
Photo by Tima Miroshnichenko from Pexels: https://www.pexels.com/photo/close-up-view-of-system-hacking-in-a-monitor-5380664/

Photo by Tima Miroshnichenko from Pexels: https://www.pexels.com/photo/close-up-view-of-system-hacking-in-a-monitor-5380664/

"A software supply chain attack occurs when a cyber threat actor infiltrates a software vendor’s network and employs malicious code to compromise the software before the vendor sends it to their customers. The compromised software then compromises the customer’s data or system."

National Institute of Standards and Technology, U.S. Department of Commerce

Such was the case when towards the end of 2020 Orion, an IT monitoring system from SolarWinds, was hacked by a group known as Nobelium. The SolarWinds hack, which was delivered by way of a software update, compromised the data, networks and systems of thousands of organisations, including private and public entities.

The incident revealed just how vulnerable computer systems are, and how interconnected enterprises are in the digital economy.

The what, why and when of software supply chain vulnerability

Jacob DePriest, deputy chief security officer at GitHub, explains that a software supply chain encompasses everything that goes into the delivery of an organisation’s software product, from initial development through to production. He adds that this includes code, binaries, and components from employees, third-party repositories, or package managers.

Open-source software grew from the desire of individuals and organisations to minimise dependence on proprietary software that is expensive, and for which the company has limited in its ability to innovate beyond what the vendor allows.

Open source software has grown in popularity, not only because it enabled organisations to test new ideas at a lower cost, but to pull talent, expertise and experience from a global community of developers, and potentially introduce innovation at a faster pace.

However, cautioned DePriest, this rapid development also comes with risks – developers may inadvertently inherit vulnerabilities from their open source dependencies, causing a ripple effect impacting the services and developers that depend on it downstream. The SolarWinds hack may well have relied on this premise.

Exploiting the vulnerabilities of a software supply chain

According to DePriest the software supply chain is susceptible to various risks, including unpatched vulnerabilities, innocent mistakes, and malicious attacks on dependencies.

He explains that supply chain attacks occur when bad actors purposely add malicious code to a component and ride the supply chain of that component to distribute the code to their targets. Attacks can happen well upstream from the main objective, say a dependency of a dependency. Attackers can use multiple methods, like inserting code as new committers, hijacking accounts, or compromising signing keys to impersonate official software.

He pointed out that developer accounts remain a prime target for social engineering and account takeover, making their protection one of the most important steps in securing the supply chain.

Jacob DePriest

"To defend against these attacks, it's essential to move beyond basic password-based authentication. Embracing strong authentication and implementing 2FA significantly reduces the prevalence of compromised accounts. Ultimately, safeguarding developer accounts is the foundation for enhanced supply chain security, helping to ensure the integrity and reliability of the software ecosystem."

Jacob DePriest

Implications of a supply chain attack on organisations

DePriest warns that software supply chain attacks can have significant implications for organisations. These types of attacks can lead to data breaches, resulting in the exposure of sensitive information and customer data.

Financial losses may also occur due to operational disruptions, recovery costs, and potential legal ramifications, damaging the reputation of affected organisations and eroding customer trust and confidence.

He believes that cyberattacks will continue to rise.

"To keep up with the speed of threats, there must be a collective industry and community effort to secure the software supply chain: a partnership between the public and private sector, organisations and working groups focused on shared security goals and direct partnerships between companies," he explains.

He posits that success should be focused on supporting developer communities and ecosystems that design, build, and maintain the open source projects we all depend on.

Why build a secure software development ecosystem

DePriest says supply chain security has emerged as a critical focus within the open source community citing the exponential growth in the use of open source software.

"However, with this rise in popularity, nefarious actors have also emerged, exploiting user accounts, corrupting vital dependencies, and targeting vulnerabilities in major open-source projects," he cautions.

He cites events like SolarWinds and Log4j as reminders of the importance of securing critical software.

"We’ve seen how just one or two lines of vulnerable code can have a major impact on the health, safety, and trustworthiness of entire systems."

Jacob DePriest

Caveat Emptor of open source

While acknowledging the continued relevance of open source software, he concedes that keeping on top of open source vulnerabilities can be extremely time-consuming. He also agrees that a collective effort from the tech industry, private sector, and community is crucial to secure the software supply chain.

"By supporting open source maintainers and providing the necessary resources, we can enhance the overall security of the software ecosystem," he explains. "Everyone has a role to play in fostering successful communities, ensuring that the code used daily is both trusted and secure."

The good news – sort of

In the 2022 Gartner Thriving Amid Complexities Supply Chain Survey, respondents revealed the extent to which organisations are taking the threat of supply chain risks.

Figure 1: Supply Chain Cybersecurity Protection Deployment Rates

Q: Please indicate if your organisation has implemented the following in your overall supply chain cybersecurity approach.
Source: 2022 Gartner Thriving Amid Complexities Supply Chain Survey

However, positive the trends are, Gartner warns that it is also observing an inflated sense of supply chain cybersecurity among respondents.

Mark Atwood

"If CSCOs are going to face the threat of increasing cyber risk head-on, they must continue to educate themselves, avoid complacency and take action. They must close the confidence/capability gap," said Mark Atwood, managing VP, Gartner Supply Chain.

Related:  Is PropTech consolidation good for CRE industry?
Tags: GartnerGitHubsoftware supply chain vulnerabilitiesSolarwinds Orion
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe