New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Tackling supply chain security head-on

New York Tech Editorial Team by New York Tech Editorial Team
February 17, 2022
in Cybersecurity
0
Tackling supply chain security head-on
Share on FacebookShare on Twitter

Threats against supply chains are growing and the reality is that the size, cost, and sophistication of these threats make it difficult for anyone organization to control or protect against them. Supply chain threats are a risk on a global scale and are now affecting a wide range of industries and organizations, from militaries and financial services to consumer electronics, education, and healthcare. Supply chain security is no easy task, and no single entity has end-to-end control. With so many stages, organizations, and companies involved, it is no surprise that hackers are gaining from the lack of sufficient security.

supply chain threats

To overcome this, every stakeholder involved must have security at the top of its agenda and come together to boost protection and ensure integrity. To make this a reality, we need industry standards that define, implement, and uphold security guidance.

One weak link

One company, stage, or process with insufficient security makes the entire chain more vulnerable to hackers and can open up a huge amount of risk when we consider the size and value of global chains that span many countries. The sophistication of cyber-attacks is making successful security practices more difficult to implement, as many hackers are now able to stay hidden for longer periods of time. Their malware can be distributed far and wide, without detection, to inflict significant damage. For hackers, supply chain attacks have become an efficient way of targeting many organizations from one single entry point. By finding a loophole at one stage in the supply chain, hackers can impact every organization that purchases hardware or software from that point onwards.

Malicious and counterfeit software or hardware is becoming extremely difficult to identify, with many end users not even considering that purchasing from a third-party vendor may come with risks. If a vendor is legitimate, many will assume that their reliability, reputation, and trustworthiness extend to their products. Unfortunately, this is not always the case. A recent report from the European Union Cybersecurity Agency (ENISA) found that around 62 percent of the analyzed attacks on customers took advantage of their trust in their supplier. This highlights that organizations must prioritize validating third-party code and software to ensure they have not been tampered with or manipulated.

To make things more challenging, many of the existing security methods that we see implemented within supply chains are mostly subjective and rely on human intervention, such as visual inspection. This includes monitoring the alignment or placement of labels, incorrect color, size, or shape of markings and verifying the authenticity of serial numbers. These are all incredibly time consuming and expensive to do at scale, but many organizations simply do not have the expertise, tools, and knowledge to implement more sophisticated and effective methods.

Higher standard of security

Industry-wide standards that offer guidance to ensure integrity of the supply chain are among the best methods of defense against attacks. If all organizations follow open-source technologies and standards, we can close the gaps hackers are using to gain access to supply chain resources.

An example of this guidance is a new Firmware Integrity Measurement (FIM) specification that was released this year by Trusted Computing Group, led by various leading technology members. Previously, there had been no definitive way to determine the security status of multiple endpoints with a network, but the FIM specification provides an official definitive guide for others to follow. It provides product guidelines that can determine the integrity of a device at the manufacturing stage and offers a baseline measurement that allows for security result comparisons throughout its lifetime. This means that at any point of a supply chain, the user or manufacturer can determine the integrity of a device. This is especially significant for large production chains, where the high number of stages, organizations and processes involved make it incredibly challenging to track the security status of devices.

The FIM specification verifies the integrity of each endpoint to prove that a device can be trusted. To do this, a baseline measurement, called a Reference Integrity Measurement (RIM), must be taken before any hacker has a chance to tamper with a device in the supply chain. This is usually done before the device is shipped at the very start of the manufacturing process. Once the device reaches the end customer, FIM can be measured and compared to RIM to confirm that a device has not been compromised at any point in the chain.

The malware installed by hackers can be extremely hard to detect as it travels through the supply chain. The FIM specification can help with this, as the integrity of devices and networks can always be verified. Widespread adoption of FIM and RIM will boost device security as the integrity can be determined at any point of the supply chain.

Improving supply chain security

Supply chain attacks are growing, and there have been multiple examples over the past few months that highlight this. Organizations within global supply chains must utilize the tools and technologies that are available to detect malware and determine integrity. The sooner a threat is identified, the less damage it can cause to the rest of the supply chain. Global supply chains are complex and with no end-to-end control resting with one company, every player needs to do their part. With so much at risk, every aspect of the supply chain will benefit from a security-first approach.

Credit: Source link

Previous Post

Oppo releases official images of new Find X5 flagship phone

Next Post

The International Chamber of Commerce’s Commercial Crime Services division, places its utmost trust in Fintech Digital Solutions, honouring them with membership

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
The International Chamber of Commerce’s Commercial Crime Services division, places its utmost trust in Fintech Digital Solutions, honouring them with membership

The International Chamber of Commerce's Commercial Crime Services division, places its utmost trust in Fintech Digital Solutions, honouring them with membership

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026
Employee Time Tracking

What is an Employee Time Tracking Solution? A Definite Guide for 2026

March 31, 2026
Voltify founders

Voltify Raises $30 Million Seed Round as It Challenges $1 Trillion Rail Electrification Model

March 31, 2026

Recommended

laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated Automat-it AWS B2B marketing Business CISO CISO Whisperer Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech Funding Announcement hi-tech Hi Auto Impala Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media