Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Why Software Supply Chains Are Vulnerable: 89% of Code Bases Use Outdated Open Source
Cybersecurity Minute

Why Software Supply Chains Are Vulnerable: 89% of Code Bases Use Outdated Open Source

Chris HughesBy Chris HughesMarch 6, 2023Updated:March 28, 20233 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 55 of the Cybersecurity Minute, Chris Hughes shares his major takeaways from a recent Synopsys cybersecurity report.

This episode is sponsored by Acceleration Economy’s Digital CIO Summit, taking place April 4-6. Register for the free event here. Tune in to the event to hear from CIO practitioners discuss their modernization and growth strategies.

Highlights

00:35 — Synopsys has published its 2023 Open Source Security and Risk Analysis Report. Chris sees some interesting findings in it that don’t bode well for software supply chain security.

00:56 — To put what’s going on with software supply chain security in context, Chris reminds us of a report from Sonatype that said software supply chain attacks are up over 700% in the last three years. Other incidents including Log4j, Codecov, SolarWinds, and more have made the software supply chain a hot topic.

01:07 — Malicious actors have realized they can target a single organization, a single open-source software project or component, and have a massive downstream impact on thousands of organizations and millions of individuals.

01:18 — Synopsys did a security assessment of more than 1,700 different code bases. And what it found is alarming. It found that 89% of code bases contained open-source software that was more than four years out of date and that 91% of those code bases contained components that had had no new development in the last two years. Plus, 84% of all the examined commercial and proprietary code bases had several high-risk vulnerabilities.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

01:49 — From an attacker’s perspective, you just have this massive ecosystem of open-source software that’s pervasive across every aspect of our software supply chain: from mundane, leisurely applications that we all use in our daily activities, to the most critical infrastructure including industrial control systems and national defense and military systems.

02:12 — Organizations simply aren’t keeping an eye on their open-source software hygiene. They have a lot of outdated open-source software in their applications, ecosystem, and infrastructure. Most of it is out of date and contains vulnerabilities. It’s just sitting there, waiting for malicious actors to take advantage of it.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner-analysts.

02:35 — This is why we see Gartner and other organizations predicting that, in a couple of years, 50% of organizations are going to experience a software supply chain attack. It’s just the nature of the ecosystem at the moment. Organizations have been using open-source software for a variety of reasons, among them efficiency and the ability to speed up development time-to-market, cost savings, and more.

See the Cybersecurity Top 10 shortlist

02:56 — But the reality is that using open-source software has a trade-off when you’re not being attentive enough to security. This means that you’re not keeping dependencies up to date and not attending to transitive dependencies that have vulnerabilities. Malicious actors are paying attention, and they are taking a lot of interest, realizing the value of this software and how it can be such an efficient attack vector. They can compromise a single target and have a massive impact downstream across the entire ecosystem.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

featured Open-Source Software software supply chain vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

Google Cloud’s Sovereignty Explorer: Why Aren’t There More Tools Like This?

March 29, 2023

Why It’s Time to Move Away From Microsoft Excel to Low-Code/No-Code and RPA Tools

March 29, 2023

Why Vendors and CIOs are Moving Towards Data Lakehouses

March 29, 2023

Chainguard Research Highlights How Customers Secure Software Supply Chains

March 29, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Google Cloud’s Sovereignty Explorer: Why Aren’t There More Tools Like This?
  • Why Vendors and CIOs are Moving Towards Data Lakehouses
  • Why It’s Time to Move Away From Microsoft Excel to Low-Code/No-Code and RPA Tools
  • Chainguard Research Highlights How Customers Secure Software Supply Chains
  • Google Cloud Simplifies Sovereignty

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.