You are here

The Increasingly Vulnerable Supply Chain

The Increasingly Vulnerable Supply Chain

Created: Tuesday, September 18, 2018 - 16:34
Categories:
Cybersecurity

According to a recent Crowdstrike study, two-thirds of organizations across a wide variety of sectors experienced a software supply chain attack in the past 12 months. Adversaries have turned to this attack vector because traditional cybersecurity solutions that protect the network perimeter are advancing to the point they have had to find other ways to infiltrate an enterprise. Software supply chain vulnerabilities are prime targets for exploiting the trust between an organization and its software providers and business partners, particularly since these third-party providers are often rushing to market and overlooking best practices for proper testing and source code security. To make it harder for software supply chain attackers to get into and traverse an entire network unabated, organizations can consider putting in place behavioral-based attack detection solutions that can defend against sophisticated supply chain attacks, segmented network architectures, real-time vulnerability management solutions, and improved controls for managing the use of privileged credentials in the environment (including control of shared/embedded admin accounts). DarkReading.