Skip to content

Enhanced security measures in business software supply chains, yet strategies exhibit a disjointed approach

Over a third of businesses have faced exploitation due to known open source weaknesses, according to the findings of the Enterprise Strategy Group study.

Companies bolster software supply chain security, yet strategies show a scattered approach
Companies bolster software supply chain security, yet strategies show a scattered approach

Enhanced security measures in business software supply chains, yet strategies exhibit a disjointed approach

In the rapidly evolving world of technology, the importance of prioritizing security during the development stage is becoming increasingly evident. Many organizations are recognizing that waiting until an attack or vulnerability occurs may be too late, as the damage can be extensive and costly to remediate.

One of the main concerns for over half of survey respondents is the high percentage of application code that is based on open source software. This has sparked an ongoing debate about the security of software supply chains and the heavy reliance of the developer community on open source software.

A study by Enterprise Strategy Group, commissioned by Synopsys, indicates that 75% of organizations have enhanced their software supply chain security in response to high-profile incidents like the SolarWinds attack and Log4j vulnerability. The enhancements include multifactor authentication, application security testing, improved asset discovery, among others.

However, despite these investments, more than one-third of organizations have been exploited due to a known open source software vulnerability in the last 12 months. This underscores the need for continued vigilance and proactive measures.

The Linux Foundation and Snyk conducted a study that found 40% of organizations don't have a great deal of confidence in open source security. This lack of confidence is understandable, given that approximately 28% of organizations have been impacted by a zero-day exploit.

The research paper on the security implications of trust in open source, published by Research Institute AG & Co KG in cooperation with the Computer Vision Lab at the Technical University of Vienna, was executed in Austria. The study highlighted the significance of managing open source as a concern for many organizations, including vulnerability management, fear of having too much open source within their application stack, and the potential for attacks.

The federal Cyber Safety Review Board revealed that the impact of the Log4j vulnerability would last well into the future, calling it an "endemic vulnerability." This emphasizes the long-term implications of neglected software security issues.

Gartner research indicates that management responses to the growing security risks to the software supply chain are still in their early stages, often being absent or fragmented. This suggests a need for more comprehensive and coordinated efforts to address these issues.

The study was based on a survey of 350 decision-makers in IT, cybersecurity, and application development. Tim Mackey, principal security strategist at Synopsys Cybersecurity Research Center, stated that managing open source is a significant concern for many organizations, and the potential for attacks is a real and pressing issue.

In conclusion, while the use of open source software offers numerous benefits, it also presents significant security challenges. Organizations must be proactive in addressing these challenges to protect their systems and data from potential threats.

Read also:

Latest