Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2023

A Timeline of Software Supply Chain Attack Examples

There are several noteworthy software supply chain attack examples that we can learn from. Why is this important? Attacks on software supply chains can be incredibly harmful as they specifically target organizations through their third-party vendors or software, hardware, or service providers at any point in the development process. The intention behind these attacks is to gain entry, carry out espionage, and enable acts of sabotage.

Building Your Secure Software Supply Chain

A secure software supply chain requires that developers be vigilant from start to finish. The software supply chain is comprised of hardware, code, libraries, and tools that turn that code into a deliverable, and its breadth and increasing importance means it has become an attractive target for cyberattacks. If one link fails, it will impact everything else in the ecosystem.

Webinar: Aligning Your SBOM with the Executive Order

A Software Bill of Materials – better known as an SBOM – can enhance your compliance posture. But how do you structure and operationalize it to ensure that it is helping with that objective? And how do you know if your SBOM complies with the Executive Order that mandates maintaining an SBOM?

Ensure Your SBOM Enhances Compliance With Our Guide

Failing to comply with software licensing agreements can cost you. This is one of many arguments – particularly in the financial realm – that motivate organizations to be in compliance – and a Software Bill of Materials (SBOM) is an increasingly important tool for that goal. It’s relatively easy for an organization to obtain unlicensed software, according to UpCounsel, a legal platform that operates a network of independent lawyers.

Software Supply Chain Security Risks, Part 2

In part one of our series on software supply chain security risk, we examined six of the top software supply chain risks, but unfortunately, there are others. Code is where modern software development begins, and the supply chain makes up everything that touches that code during the software development lifecycle–from infrastructure to hardware to operating systems to cloud services. In other words, software supply chains are the lifeblood of most organizations.

Software Supply Chain Security Risks, Part 1

It cannot be stated enough that software supply chain security risks are serious as organizations are so dependent on the software supply chain, an attack could cripple their business. The effects of the Log4j vulnerability continue to be felt as it spreads through the supply chain, all but assuring that more threats will emerge. Further, open source is increasingly being used in development projects.

Are You Ready for the New FDA Cybersecurity Mandate for Medical Devices?

The Food and Drug Administration (FDA) has done more than just apply a bandage on the issue of cybersecurity-related risks in medical devices. Late last month, the FDA issued guidance for medical device companies to ensure the safety of devices like heart monitors, MRI machines, and insulin pumps.

New National Cybersecurity Strategy Will Require Compliance, Collaboration

The Biden administration’s recently released National Cybersecurity Strategy goes beyond the executive order it issued in 2021, which defined security measures any organization doing business with the federal government must follow.

Beyond SolarWinds: 6 More Notable Software Supply Chain Attacks

SolarWinds has become almost a household name and for all the wrong reasons: beginning in 2019, the system management company was the target of one of the largest software supply chain attacks in history. Software supply chain attacks are especially insidious because they target organizations by going after their third-party vendors or suppliers of software, hardware, or services at any stage of the development lifecycle. The goal is to gain access, conduct espionage, and enable sabotage.