New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

The ripple effect: Why protection against supply chain attacks is a must

New York Tech Editorial Team by New York Tech Editorial Team
December 1, 2021
in Cybersecurity
0
The ripple effect: Why protection against supply chain attacks is a must
Share on FacebookShare on Twitter

The SolarWinds attack continues to send ripples across the world of cybersecurity. For the uninitiated, this form of cyber attack was like a gradual spread of poison, and its fallout proved to be massive – starting with national (US) security concerns that Russia might have been involved and ending up with President Biden issuing an Executive Order on improving the nation’s cybersecurity, followed closely by similar efforts by the UK government.

supply chain attacks protection

Whether or not it was a state-sponsored venture, this attack proved to be a huge wake-up call and shone a spotlight on software supply chain attacks. This has become particularly significant given that threat actors have quickly adapted this same approach to other supply chains.

Indeed, it seems that they might have found the holy grail by targeting companies with a strong web presence. Hence the emergence of one of the key growing attack vectors in 2021: the “web supply chain attack”.

The what?

Let’s start from the beginning, and that means looking at the dominance of JavaScript across the web. JavaScript is the “language” of the web. It is estimated that 97% of the world’s websites use JavaScript—including the websites of all Fortune 500 companies.

Twenty years ago, the web mostly consisted of static websites with little to no functionality – but that quickly changed. Ever since the JavaScript open-source community began to assert itself back in 2009, we witnessed an explosion of open-source projects, with the community releasing millions of reusable code pieces (modules or packages) that could be easily shared by different projects. The subsequent development of this ecosystem increased the speed of development for all apps – web, mobile and desktop.

In such a hot space, companies sought to cut product development time by relying on peer-reviewed, third-party modules instead of developing every piece of code in-house. And so, the use of third-party code became standard in web development.

Meanwhile, the web was becoming more valuable and complex. Static websites turned into dynamic pages, culminating in today’s full-fledged digital services like online banking, e-commerce, and streaming. This quick shift was also driven by a growing supply chain of digital services for marketing, UX, and business tools. Instead of implementing their own chatbot, analytics or CRM tools, companies purchased these services from third parties and integrated them directly into their websites.

It’s no wonder, then, that over two-thirds of all the code running on the average website today comes from third parties. And here is where security concerns arise. In the context of a website, every single piece of third-party code has the exact same permissions as any remaining code that was developed internally. So, if a chatbot tool suddenly decides to start capturing and leaking the credit card information of shoppers to an e-commerce site, there is nothing to stop it. This is the essence of a web supply chain attack – breaching a third-party service provider, injecting malicious code into the actual service and, as a result, spreading it to every website that uses it.

Not only do companies have no control over this, but they also have no actual visibility over these attacks. That’s why attacks like Magecart often remain active for months on end.

Best defence?

The UK’s National Cyber Security centre offers some useful advice when it comes to assessing supply chain security and assessing supply chain management practice. Indeed, they provide information on a series of 12 principles, designed to help organizations establish effective control and oversight of their supply chains. It’s a useful starting point but dealing with web supply chain attacks requires an in-depth look at third-party code usage.

Third-party code is here to stay. It is embedded in the core fabric of web development and remains one of the most valuable assets for competitive product development. However, it is possible to alleviate the risks inherent within externally sourced code if companies learn how to safely integrate it. This would require security and development teams to reduce code dependencies wherever possible and implement technology to provide them with visibility and control over the behavior of all code running on the client-side of their websites (i.e., everything that takes place on the browser or end-user device).

This is key if companies are to regain control over their web supply chain. And to maximize levels of security, then companies need to do it continuously at runtime, monitoring every user session for signs of malicious behavior.

This underpins the thinking behind DevSecOps – a real paradigm shift in the software industry that seeks to robustly integrate security into modern app development and deployment. As part of a global push toward more secure supply chains, DevSecOps can ingrain security controls throughout the entire software development lifecycle. These practices can certainly help businesses to regain the visibility and control over their website supply chains that we have already touched upon.

The SolarWinds supply chain attack certainly ruffled a lot of important feathers. On the flip side, it has brought global awareness and the first signs of action against what may become one of the key cyber threats of the decade. Today, we’re at a key moment in time where preventing these attacks is within reach, while the cost of failing to do so is too high to ignore.

Credit: Source link

Previous Post

“Startup Talks”: alums explain startup origins, success

Next Post

Meet the robotics engineer who has designed contactless gol gappa vending machine

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Meet the robotics engineer who has designed contactless gol gappa vending machine

Meet the robotics engineer who has designed contactless gol gappa vending machine

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026
Employee Time Tracking

What is an Employee Time Tracking Solution? A Definite Guide for 2026

March 31, 2026
Voltify founders

Voltify Raises $30 Million Seed Round as It Challenges $1 Trillion Rail Electrification Model

March 31, 2026

Recommended

laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated Automat-it AWS B2B marketing Business CISO CISO Whisperer Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech Funding Announcement hi-tech Hi Auto Impala Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media