Security

CSO

Feeling VEXed by software supply chain security? You’re not alone

Chainguard CEO explains how to secure code given crims know to poison it at the source


SCSW The vast majority of off-the-shelf software is composed of imported components, whether that's open source libraries or proprietary code. And that spells a security danger: if someone can subvert one of those components, they can infiltrate every installation of applications using those dependencies.

"Attackers have realized this, and that it's easy to hide in and attack all those gaps, those third-party components as they get transferred around and reused by other vendors," Dan Lorenc, CEO and co-founder of security specialists Chainguard, told The Register

"We've seen a huge rise in supply chain attacks over the last couple of years, which has led to increasing recollection and attention in the space," Lorenc added.

This, in turn, has led to increased regulation and attention as the government and private industry have taken steps to secure software supply chains — and prevent another major incident such as the SolarWinds or Log4j attacks.

For The Register's Supply Chain Security Week, we sat down with Lorenc to discuss these efforts, including one that his startup is spearheading called OpenVEX, an open source specification that aims to jumpstart the adoption of the Vulnerability Exploitability eXchange, or VEX. 

And because the industry loves its acronyms, VEX is intended to complement another supply-chain security tool called SBOM, or software bill of materials.

Tune into the interview above as Lorenc discusses the challenges of securing software supply chains and how all of these acronyms can help. ®

Send us news
Post a comment

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

BlackBerry squashes plan to spin out its IoT biz

Board and incoming CEO decide reorganizing is better than splitting

Dump C++ and in Rust you should trust, Five Eyes agencies urge

Memory safety vulnerabilities need to be crushed with better code

Cisco intros AI to find firewall flaws, warns this sort of thing can't be free

Predicts cyber crims will find binary brainboxes harder to battle

Uncle Sam probes cyberattack on Pennsylvania water system by suspected Iranian crew

CISA calls for stronger IT defenses as Texas district also hit by ransomware crew

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

AlphV lays claims to the intrusion

Polish train maker denies claims its software bricked rolling stock maintained by competitor

Says it was probably hacked, which isn't good news either

Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets

Akamai says it reported the flaws to Microsoft. Redmond shrugged

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

US warns Iranian terrorist crew broke into 'multiple' US water facilities

There's a war on and critical infrastructure operators are still using default passwords

Hershey phishes! Crooks snarf chocolate lovers' creds

Stealing Kit Kat maker's data?! Give me a break

Weak session keys let snoops take a byte out of your Bluetooth traffic

BLUFFS spying flaw present in iPhones, ThinkPad, plenty of chipsets