Vulnerable Software Supply Chains Are a Multi

News

HomeHome / News / Vulnerable Software Supply Chains Are a Multi

May 02, 2023

Vulnerable Software Supply Chains Are a Multi

Juniper Research recognizes that supply chains have become increasingly digital

Juniper Research recognizes that supply chains have become increasingly digital across all verticals, products, and services, resulting in heightened security risks. The following verticals are at the forefront of the issue:

Juniper Research recommends three key areas of focus for organizations to harden and secure their software supply chains:

1. Know your suppliers: Organizations require intimate knowledge of their vendors in order to identify risks that could be exposed by integrating the prospective vendor into their environment. This is enabled by working with vendors who act transparently, by providing proof of their compliance with security standards through SBOMs.

2. Consider immediate software updates: Staying ahead of the planning and implementation of software updates is vital to security. This can be time-consuming, and the onus should be shared by both suppliers and users. Suppliers must ensure security by design, and users must have robust processes for security management.

3. Raise awareness internally: Create a culture of transparency and proactivity by driving internal awareness and process-building around software supply chain security. This includes enforcing, rather than suggesting, preventative measures like vendor attestation during procurement, and making constant security updates a condition of continued business.

Furthermore, BlackBerry urges governments to take an active and urgent stance on ensuring resilient software supply chains. Before the challenge becomes insurmountable, governments must make a concrete decision on what a strong security posture resembles. The groundwork now exists to embolden this by staying ahead of vulnerabilities, in part through strong software update hygiene and resilient cybersecurity tools, while ensuring third-party data handlers have secure data-processing practices. Leading by example will encourage business executives to raise awareness internally, and to consider cybersecurity as a component of safety.

Juniper Research determines that BlackBerry, as a seasoned security vendor, has the capabilities to secure the software supply chain end-to-end and throughout the product life cycle. Among various BlackBerry solutions, Juniper Research highlights BlackBerry® Jarvis® as a tool for easily and accurately generating SBOMs. In a specific example, BlackBerry Jarvis produced the same results in seven minutes that two analysts produced in 30 days. Additionally, Juniper Research identified BlackBerry's Cylance® AI OEM Engine as an effective, resilient, and lightweight embedded technology that protects long-life assets — whether they are online or offline — against increasingly complex threats across the IoT.

Read the full Juniper Research whitepaper here: Vulnerable Software Supply Chains Are a Multi-Billion Dollar Problem.

For similar articles and news delivered straight to your inbox, subscribe to the BlackBerry Blog.

Related Reading

Noah Campbell is the Senior Elite Technical Marketing Specialist at BlackBerry.