Podcasts about software supply chain security

  • 59PODCASTS
  • 110EPISODES
  • 37mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Feb 24, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about software supply chain security

Latest podcast episodes about software supply chain security

Resilient Cyber
Resilient Cyber w/ Katie Norton - AppSec Industry Analysis & Trends

Resilient Cyber

Play Episode Listen Later Feb 24, 2025 47:19


In this episode of Resilient Cyber, we catch up with Katie Norton, an Industry Analyst at IDC who focuses on DevSecOps and Software Supply Chain Security. We will dive into all things AppSec, including 2024 trends and analysis and 2025 predictions.Katie and I discussed:Her role with IDC and transition from Research and Data Analytics into being a Cyber and AppSec Industry Analyst and how that background has served her during her new endeavor.Key themes and reflections in AppSec through 2024, including disruption among Software Composition Analysis (SCA) and broader AppSec testing vendors.The age-old Platform vs. Point product debate concerns the iterative and constant cycle of new entrants and innovations that grow, add capabilities, and become platforms or are acquired by larger platform vendors. The cycle continues infinitely.Katie's key research areas for 2025 include Application Security Posture Management (ASPM), Platform Engineering, SBOM Management, and Securing AI Applications.The concept of a “Developer Tax” and the financial and productivity impact legacy security tools and practices are having on organizations while also building silos between us and our Development peers.The role of AI in corrective code fixes and the ability of AI-assisted automated remediation tooling to drive down remediation timelines and vulnerability backlogs.The importance of storytelling, both as an Industry Analyst and in the broader career field of Cybersecurity.

What the Dev?
290: The state of software supply chain security (with Sonatype's Brian Fox)

What the Dev?

Play Episode Listen Later Dec 17, 2024 14:52


In this episode, David Rubinstein interviews Brian Fox, co-founder and CTO of Sonatype. They discuss the company's 10th annual State of the Software Supply Chain report. Key talking points include: The rapid growth of malicious open-source componentsThe increasing length of time needed to remediate vulnerabilitiesHow regulations impact supply chain securityNote: This will be the final episode of What The Dev released in 2024. We'll be back in early January 2025! 

FINOS Open Source in Fintech Podcast
Leveraging AI for Software Supply Chain Security with Sudhir Prasad, Director of Product Management, Red Hat

FINOS Open Source in Fintech Podcast

Play Episode Listen Later Dec 11, 2024 36:13


Leveraging AI for Software Supply Chain Security with Sudhir Prasad, Director of Product Management, Red Hat | OS in Finance Podcast In this episode of the FINOS podcast, Grizz Griswold interviews Sudhir Prasad, Director of Product Management at Red Hat, about the critical role of AI in enhancing software supply chain security. They delve into important topics such as leveraging AI for supply chain security, the transparency and provenance of AI models, and the challenges of integrating open-source solutions. Sudhir shares his journey from a developer to a product management leader and discusses best practices for ensuring software integrity, unburdening developers, and the importance of regulatory compliance. Tune in to gain valuable perspectives on the evolving landscape of software security and AI. 00:00 Introduction to AI in Software Supply Chain Security 01:01 Meet Sudhir Prasad from Red Hat 01:38 Sudhir's Journey from Developer to Product Manager 05:19 The Importance of Open Source in Software Development 07:32 Challenges and Solutions in Software Supply Chain Security 20:04 Leveraging AI for Software Supply Chain Security 22:49 Daily Work and Future Directions at Red Hat 35:00 Conclusion and Final Thoughts Sudhir Prasad: https://www.linkedin.com/in/sudhirprasad/ Red Hat: https://www.redhat.com/en/solutions/financial-services Grizz Griswold: https://www.linkedin.com/in/aarongriswold/ Find more info about FINOS: On the web: https://www.finos.org/ Open Source in Finance Forum (OSFF Conference): https://www.finos.org/osff-2025 2024 State of Open Source in Financial Services Download: ⁠https://www.finos.org/state-of-open-source-in-financial-services-2024⁠ FINOS Current Newsletter Here: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.finos.org/newsletter LinkedIn: https://www.linkedin.com/company/finosfoundation/ Twitter: https://twitter.com/FINOSFoundation About FINOS FINOS (The Fintech Open Source Foundation) is a nonprofit whose mission is to foster the adoption of open source, open standards, and collaborative software development practices in financial services. It is the center for open source developers and the financial services industry to build new technology projects that have a lasting impact on business operations. As a regulatory compliant platform, the foundation enables developers from these competing organizations to collaborate on projects with a strong propensity for mutualization. It has enabled codebase contributions from both the buy- and sell-side firms and counts over 50 major financial institutions, fintechs and technology consultancies as part of its membership. FINOS is also part of the Linux Foundation, the largest shared technology organization in the world. Get involved and join FINOS as a Member.

Cyber Security Weekly Podcast
Episode 415 - The Risk Story – Software Supply Chain Security

Cyber Security Weekly Podcast

Play Episode Listen Later Sep 26, 2024 22:13


We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT).Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents unique risks, such as compromised design specifications, development flaws, or issues during fabrication. She emphasized that securing the software supply chain requires a holistic approach that goes beyond protecting just software; it must also include firmware and hardware. For example, when working with an Intel chip, securing both the software and firmware associated with that chip is critical. Firmware, which operates at a low level on hardware, is vital for overall system security. Any vulnerabilities in firmware can significantly compromise the entire system, making it essential to secure it alongside software and hardware.Challenges in Secure by Design - Crosley also noted that while "secure by design" principles often originate from an IT perspective, they may not seamlessly translate to OT environments. This disparity creates challenges, as certain IT security measures, like multi-factor authentication (MFA), may not be practical or necessary in OT due to specific operational needs. Additionally, OT devices are often multi-generational, increasing the risk of outdated security designs. OT systems, such as programmable logic controllers (PLCs) used in industrial settings, have distinct requirements and constraints, necessitating tailored security approaches.Automated Patching Issues - Crosley highlighted that automated patching in OT environments can pose safety concerns and lead to downtime. Unlike IT systems where automated updates are common, OT systems often require careful, manual handling to avoid disrupting critical processes. Automated patching can interfere with vital safety mechanisms, underscoring the need for controlled and deliberate update management.SBOM (Software Bills of Materials) - Crosley pointed out that while generating accurate Software Bills of Materials (SBOMs) for modern technologies is relatively straightforward, it becomes more complex for multi-generational OT products due to outdated build practices and the limitations of current scanning tools. While scanners effectively identify open-source components, they struggle with proprietary or commercial libraries, and discrepancies in version identification can be problematic, particularly if certain versions have known vulnerabilities.Role of AI in Software Development – She also pointed out how AI can quickly analyze vast amounts of data, identifying risks and correlations between projects that would take humans much longer to detect. For example, AI can track a maintainer's contributions across multiple projects to spot potential security risks, such as involvement in both malicious and non-malicious projects. AI is also increasingly offering developers precise guidance on addressing specific vulnerabilities. Instead of generic suggestions, AI now recommends the best code modifications for a given context, speeding up development and enhancing code security.Supplier Assessment - Crosley advised that supplier assessments should focus on specific aspects of vulnerability management and product security rather than generic compliance questions. It's crucial to inquire about suppliers' vulnerability management practices and their methods for ensuring product security. She emphasized the importance of transparency from suppliers regarding their manufacturing processes, product variations, and supply chain details, advocating for detailed questions to effectively understand and mitigate risks.Positive Cultural Shift - Crosley shared an encouraging trend where companies are increasingly prioritizing supply chain security. A notable example is a supplier that created a position for a Product Security Officer after facing rigorous scrutiny, reflecting a positive shift towards more robust supply chain security practices.Cassie Crossley, Vice President, Supply Chain Security in the global Cybersecurity & Product Security Office at Schneider Electric, is an experienced cybersecurity technology executive in Information Technology and Product Development and author of “Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware”. She has many years of business and technical leadership experience in supply chain security, cybersecurity, product/application security, software/firmware development, program management, and data privacy. #mysecuritytv

FOCUS ON: DevOps
Entwickeln mit DevContainern - Flexibilität trifft Sicherheit

FOCUS ON: DevOps

Play Episode Listen Later Sep 5, 2024 64:50


In dieser Episode des Focus On DevOps Podcasts diskutieren wir mit Hagen Naumann, einem Experten auf dem Gebiet moderner Entwicklungsumgebungen, die Revolution der Container-basierten Entwicklung. Mit Tools wie Coder, Gitpod und GitHub Codespaces verlagern sich traditionelle Entwicklungspraktiken zunehmend in vollständig konfigurierte, portable Container. Diese Entwicklung verspricht, die Herausforderungen zahlreicher Abhängigkeiten, unterschiedlicher Interpreter-Versionen und der Verwaltung virtueller Umgebungen auf lokalen Maschinen zu überwinden. Unternehmen haben nun die Möglichkeit, vorgefertigte, sprach- oder anwendungsspezifische Umgebungen bereitzustellen und kritische Aspekte der Software Supply Chain Security von Anfang an zu kontrollieren. Doch könnte diese Standardisierung auch zu restriktiv sein und die Kreativität und Flexibilität der EntwicklerInnen einschränken? Wir beleuchten die Vor- und Nachteile dieser Entwicklungsansätze und werfen einen Blick auf die Zukunft der Entwicklungsumgebungen in der Softwarebranche.

ITSPmagazine | Technology. Cybersecurity. Society
Best Practices in Securing 3rd Party Supply-Chain with Cassie Crossley | Cybersecurity Insights Podcast with Matthew Rosenquist

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 2, 2024 39:30


Guest: Cassie Crossley, VP of Supply Chain Security at Schneider Electric and AuthorOn LinkedIn | https://www.linkedin.com/in/cassiecrossley/Host: Matthew RosenquistOn ITSPmagazine  

Cybercrime Magazine Podcast
Cyber Trust & Transparency. The State of Software Supply Chain Security. Adam Keown, CISO at Eastman

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 13, 2024 15:42


Adam Keown is the CISO at Eastman. In this episode, he joins host Heather Engel to discuss the state of software supply chain security, including how recent attacks – including those on ChangeHealthcare and Snowflake – play a role, and more. SecurityScorecard is the leading security rating company, used by more than 2,500 top companies. To learn more about our sponsor, visit https://securityscorecard.com

Fortinet Cybersecurity Podcast
Brass Tacks #3 - Exploring Software Supply Chain Security: Debunking GenAI and LLMs Hype

Fortinet Cybersecurity Podcast

Play Episode Listen Later Aug 7, 2024 21:34


Welcome to Brass Tacks - Talking Cybersecurity, the latest Fortinet podcast series where we discuss the business implications of cybersecurity. Half a century since the first computer virus, most of us are familiar with the usual suspects of cyberattack—bots, phishing, ransomware etc. So what's new? Tune in as our host, Joe Robertson, is joined by Ricardo Ferreira, European Field CISO at Fortinet as they discuss some of the new and emerging threats and tactics currently on the radar, and their devastating impact on several high-profile target organizations. They'll continue with a discussion on the potential risks posed by the rapid adoption of Generative AI and LLMs into our software supply chains, and what can be done to mitigate them—both from a technological and organizational standpoint. Learn more about debunking GenAI and LLMs hype: https://www.fortinet.com/blog/ciso-collective/emerging-cybersecurity-threats-and-attack-tactics More about Fortinet: https://ftnt.net/60595CcyH Read our blog: https://ftnt.net/60505Ccyj Follow us on LinkedIn: https://ftnt.net/60515Ccyd

Category Visionaries
Dan Lorenc, CEO & Founder of Chainguard: $250 Million Raised to Power the Future of Software Supply Chain Security

Category Visionaries

Play Episode Listen Later Aug 6, 2024 20:32


KuppingerCole Analysts
Analyst Chat #219: Software Supply Chain Security

KuppingerCole Analysts

Play Episode Listen Later Jul 8, 2024 24:45


In this episode, Matthias Reinwarth and Alexei Balaganski discuss the topic of software supply chain security. They explore the different perspectives and challenges surrounding this topic, including the lack of common definitions and the need for practical recommendations. They also discuss the importance of trust in software and the potential solutions, such as software bill of materials and collaboration within the industry. The episode concludes with a call for further discussion and exploration of this complex and evolving topic.

Reimagining Cyber
Unpacking SBOMs: The Building Blocks of Software Security - Ep 103

Reimagining Cyber

Play Episode Listen Later Jun 26, 2024 33:11


In this episode, Stan Wisseman and Rob Aragao welcome Justin Young to explore the transformative role of Software Bill of Materials (SBOMs) in enhancing software supply chain security. Justin shares his extensive experience and insights into how SBOMs contribute to the maturation of the software industry, drawing parallels with the auto and food industries' approaches to defect and ingredient tracking.The discussion delves into the regulatory landscape, highlighting the FDA's SBOM requirements for medical devices, the U.S. National Cybersecurity Strategy, and various compliance mandates from CISA, DORA, PCI, and the EU CRA. Justin explains the importance of shifting liability to software vendors and away from end users and open-source developers, emphasizing the need for actively maintained and secure software components.Listeners will gain an understanding of the different SBOM formats, Cyclone DX and SPDX, and their respective advantages. Justin also addresses the challenges organizations face in managing SBOMs, including procurement, validation, and the necessity of a dedicated SBOM program manager.Finally, the episode explores the practicalities of SBOM implementation, from storage and cataloging to enrichment and vulnerability management, offering a comprehensive guide for organizations aiming to bolster their software security practices.Tune in to learn how SBOMs are reshaping the software industry, driving transparency, and enhancing security across software supply chains.Relevant Links:Episode 88: Open-Source Software: Unlocking efficiency and innovationEpisode 41: Do a little dance, Time for some SLSAEpisode 26: Log4j Vulnerabilities: All you need to know and how to protect yourselfEpisode 4: SolarWinds: Bringing down the building… Software Supply-Chain Pressure PointsWhitepaper: The need for a Software Bill of MaterialsSoftware Supply Chain Hub pageFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

Application Security PodCast
Matt Rose -- Software Supply Chain Security Means Many Different Things to Different People

Application Security PodCast

Play Episode Listen Later Jun 11, 2024 46:14


In this episode of the Application Security Podcast, hosts Chris Romeo and Robert Hurlbut welcome Matt Rose, an experienced technical AppSec testing leader. Matt discusses his career journey and significant contributions in AppSec. The conversation delves into the nuances of software supply chain security, exploring how different perceptions affect its understanding. Matt provides insights into the XZ compromise, critiques the buzzword 'shift left,' and discusses the role of digital twins and AI in enhancing the supply chain security. He emphasizes the need for a comprehensive approach beyond SCA, the relevance of threat modeling, and the potential risks and benefits of AI in security. The discussion also touches on industry trends, the importance of understanding marketing terms, and the future directions of AppSec.Mentioned in the episode:The Application Security Program Handbook by Derek Fisher https://www.manning.com/books/application-security-program-handbookPodcast Episode: Derek Fisher – The Application Security Program Handbook https://youtu.be/DgmlHgNT-UMAuthors mentioned: Steven E. Ambrose  https://www.simonandschuster.com/authors/Stephen-E-Ambrose/1063454 Mark Frost  https://en.wikipedia.org/wiki/Mark_FrostFOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Paul's Security Weekly
Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Idan Plotnik, Luis Villa, Erez Hasson - ASW #287

Paul's Security Weekly

Play Episode Listen Later Jun 4, 2024 72:08


Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and trust. Segment Resources: https://www.cisa.gov/news-events/news/lessons-xz-utils-achieving-more-sustainable-open-source-ecosystem https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 https://www.cisa.gov/securebydesign/pledge https://tidelift.com/about/press-releases/tidelift-study-reveals-that-despite-increasing-demands-from-government-and-industry-60-of-maintainers-are-still-unpaid-volunteers https://blog.tidelift.com/paying-maintainers-the-howto Application security posture management has quickly become a hot commodity in the world of AppSec, but questions remain around what is defined by ASPM. Vendors have cropped up from different corners of the AppSec space to help security teams make their programs more effective, improve their security postures, and connect the dots between developers and security. Apiiro is setting the diamond standard for ASPM, combining deep code analysis, runtime context, and native risk detection with a 100% open platform approach, providing more valuable prioritization and a more powerful policy engine. This segment is sponsored by Apiiro. Visit https://securityweekly.com/apiirorsac to learn more about them! Bots accounted for nearly half of all internet traffic in 2023, with bad bot traffic rising for a fifth consecutive year. Malicious bot activity is a significant risk for businesses as it can result in account compromise, higher infrastructure and support costs, customer churn, and more. Tune in to learn about the security risks of these automated threats and what trends Imperva has monitored. This segment is sponsored by Imperva. Visit https://securityweekly.com/impervarsac to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-287

Paul's Security Weekly TV
Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Luis Villa - ASW #287

Paul's Security Weekly TV

Play Episode Listen Later Jun 4, 2024 42:04


Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and trust. Segment Resources: https://www.cisa.gov/news-events/news/lessons-xz-utils-achieving-more-sustainable-open-source-ecosystem https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 https://www.cisa.gov/securebydesign/pledge https://tidelift.com/about/press-releases/tidelift-study-reveals-that-despite-increasing-demands-from-government-and-industry-60-of-maintainers-are-still-unpaid-volunteers https://blog.tidelift.com/paying-maintainers-the-howto Show Notes: https://securityweekly.com/asw-287

Application Security Weekly (Audio)
Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Idan Plotnik, Luis Villa, Erez Hasson - ASW #287

Application Security Weekly (Audio)

Play Episode Listen Later Jun 4, 2024 72:08


Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and trust. Segment Resources: https://www.cisa.gov/news-events/news/lessons-xz-utils-achieving-more-sustainable-open-source-ecosystem https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 https://www.cisa.gov/securebydesign/pledge https://tidelift.com/about/press-releases/tidelift-study-reveals-that-despite-increasing-demands-from-government-and-industry-60-of-maintainers-are-still-unpaid-volunteers https://blog.tidelift.com/paying-maintainers-the-howto Application security posture management has quickly become a hot commodity in the world of AppSec, but questions remain around what is defined by ASPM. Vendors have cropped up from different corners of the AppSec space to help security teams make their programs more effective, improve their security postures, and connect the dots between developers and security. Apiiro is setting the diamond standard for ASPM, combining deep code analysis, runtime context, and native risk detection with a 100% open platform approach, providing more valuable prioritization and a more powerful policy engine. This segment is sponsored by Apiiro. Visit https://securityweekly.com/apiirorsac to learn more about them! Bots accounted for nearly half of all internet traffic in 2023, with bad bot traffic rising for a fifth consecutive year. Malicious bot activity is a significant risk for businesses as it can result in account compromise, higher infrastructure and support costs, customer churn, and more. Tune in to learn about the security risks of these automated threats and what trends Imperva has monitored. This segment is sponsored by Imperva. Visit https://securityweekly.com/impervarsac to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-287

Application Security Weekly (Video)
Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Luis Villa - ASW #287

Application Security Weekly (Video)

Play Episode Listen Later Jun 4, 2024 42:04


Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and trust. Segment Resources: https://www.cisa.gov/news-events/news/lessons-xz-utils-achieving-more-sustainable-open-source-ecosystem https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 https://www.cisa.gov/securebydesign/pledge https://tidelift.com/about/press-releases/tidelift-study-reveals-that-despite-increasing-demands-from-government-and-industry-60-of-maintainers-are-still-unpaid-volunteers https://blog.tidelift.com/paying-maintainers-the-howto Show Notes: https://securityweekly.com/asw-287

ITSPmagazine | Technology. Cybersecurity. Society
Exploring the Future of Software Supply Chain Security | An RSA Conference 2024 Conversation with Cassie Crossley | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 12, 2024 22:14


Guest: Cassie Crossley, VP, Supply Chain Security, Schneider Electric [@SchneiderElec]On LinkedIn | https://www.linkedin.com/in/cassiecrossley/On Twitter | https://twitter.com/Cassie_CrossleyOn Mastodon | https://mastodon.social/@Cassie_Crossley____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThis discussion shed light on various aspects of cybersecurity, technology, and the evolving role of IT professionals in addressing the challenges of the digital age.The conversation kicked off with Sean Martin providing a warm welcome to the audience as he introduced the topic of software supply chain security. Cassie Crossley shared insights from her extensive experience in cybersecurity at Schneider Electric, emphasizing the critical importance of safeguarding product security and supply chain integrity.Embracing Innovation and Resilience in CybersecurityThe discussion dive into the concept of resilience in cybersecurity and the need for proactive risk management strategies. Both speakers emphasized the importance of leveraging AI-driven decision-making processes to enhance efficiency and reduce false positives in security operations. They also highlighted the role of machine learning and behavior analytics in strengthening cybersecurity posture.Bridging the Gap between IT and Business ObjectivesCrossley and Martin discussed the evolving role of IT professionals in bridging the gap between technical cybersecurity measures and broader business objectives. They stressed the significance of aligning cybersecurity initiatives with the overall strategic goals of the organization and fostering communication between C-suite executives and security professionals.Navigating the Complexities of Hardware Development and CybersecurityThe conversation also touched upon the complexities of hardware development and the unique challenges faced in securing chipboards and other hardware components. Crossley highlighted the nuances of cybersecurity in defending against a myriad of potential threats and underscored the need for robust verification processes in hardware security.Empowering Businesses with GRC Controls and Cybersecurity Best PracticesAs the discussion progressed, Crossley shared practical insights from her book on software supply chain security, emphasizing the essential GRC controls and cybersecurity best practices that organizations can implement to enhance their security posture. She highlighted the need for startups and companies to prioritize cybersecurity measures despite budget constraints.Concluding Thoughts and Looking Towards the FutureIn wrapping up the conversation, both speakers expressed optimism about the future of software supply chain security and the potential for innovation in AI-driven cybersecurity technologies. They encouraged businesses to prioritize cybersecurity education, resilience planning, and proactive risk management to stay ahead of emerging threats.The engaging discussion between Cassie Crossley and Sean Martin at RSA Conference 2024 provided valuable insights into the evolving landscape of software supply chain security and the key challenges facing cybersecurity professionals. As organizations navigate the complexities of the digital age, proactive cybersecurity measures and a strategic alignment with business objectives are essential for safeguarding critical assets and maintaining a strong security posture.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:

Redefining CyberSecurity
Exploring the Future of Software Supply Chain Security | An RSA Conference 2024 Conversation with Cassie Crossley | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later May 12, 2024 22:14


Guest: Cassie Crossley, VP, Supply Chain Security, Schneider Electric [@SchneiderElec]On LinkedIn | https://www.linkedin.com/in/cassiecrossley/On Twitter | https://twitter.com/Cassie_CrossleyOn Mastodon | https://mastodon.social/@Cassie_Crossley____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThis discussion shed light on various aspects of cybersecurity, technology, and the evolving role of IT professionals in addressing the challenges of the digital age.The conversation kicked off with Sean Martin providing a warm welcome to the audience as he introduced the topic of software supply chain security. Cassie Crossley shared insights from her extensive experience in cybersecurity at Schneider Electric, emphasizing the critical importance of safeguarding product security and supply chain integrity.Embracing Innovation and Resilience in CybersecurityThe discussion dive into the concept of resilience in cybersecurity and the need for proactive risk management strategies. Both speakers emphasized the importance of leveraging AI-driven decision-making processes to enhance efficiency and reduce false positives in security operations. They also highlighted the role of machine learning and behavior analytics in strengthening cybersecurity posture.Bridging the Gap between IT and Business ObjectivesCrossley and Martin discussed the evolving role of IT professionals in bridging the gap between technical cybersecurity measures and broader business objectives. They stressed the significance of aligning cybersecurity initiatives with the overall strategic goals of the organization and fostering communication between C-suite executives and security professionals.Navigating the Complexities of Hardware Development and CybersecurityThe conversation also touched upon the complexities of hardware development and the unique challenges faced in securing chipboards and other hardware components. Crossley highlighted the nuances of cybersecurity in defending against a myriad of potential threats and underscored the need for robust verification processes in hardware security.Empowering Businesses with GRC Controls and Cybersecurity Best PracticesAs the discussion progressed, Crossley shared practical insights from her book on software supply chain security, emphasizing the essential GRC controls and cybersecurity best practices that organizations can implement to enhance their security posture. She highlighted the need for startups and companies to prioritize cybersecurity measures despite budget constraints.Concluding Thoughts and Looking Towards the FutureIn wrapping up the conversation, both speakers expressed optimism about the future of software supply chain security and the potential for innovation in AI-driven cybersecurity technologies. They encouraged businesses to prioritize cybersecurity education, resilience planning, and proactive risk management to stay ahead of emerging threats.The engaging discussion between Cassie Crossley and Sean Martin at RSA Conference 2024 provided valuable insights into the evolving landscape of software supply chain security and the key challenges facing cybersecurity professionals. As organizations navigate the complexities of the digital age, proactive cybersecurity measures and a strategic alignment with business objectives are essential for safeguarding critical assets and maintaining a strong security posture.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:

Talk Python To Me - Python conversations for passionate developers
#457: Software Supply Chain Security with Phylum

Talk Python To Me - Python conversations for passionate developers

Play Episode Listen Later Apr 19, 2024 68:21


We've spoken previously about security and software supply chains and we are back at it this episode. We're diving in again with Charles Coggins. Charles works at a software supply chain company and is on to give us the insiders and defender's perspective on how to keep our Python apps and infrastructure safe. Episode sponsors Sentry Error Monitoring, Code TALKPYTHON Mailtrap Talk Python Courses Links from the show Pick a Python Lockfile and Improve Security: blog.phylum.io Bad Beat Poetry: blog.phylum.io PEP 665 – A file format to list Python dependencies for reproducibility of an application: peps.python.org PEP 517 – A build-system independent format for source trees: peps.python.org PEP 518 – Specifying Minimum Build System Requirements for Python Projects: peps.python.org Lockfiles should be committed on all projects: classic.yarnpkg.com An Overview of Software Supply Chain Security: tldrsec.com Typosquatting: docs.phylum.io Common Attack Pattern Enumeration and Classification: capec.mitre.org Dependency Confusion: docs.phylum.io Expired Author Domains: docs.phylum.io Unverifiable Dependency: docs.phylum.io Repo Jacking: Hidden Danger in Broken Links: blog.phylum.io Software Libraries Are Terrifying: medium.com phylum 0.43.0: pypi.org linguist: github.com rich-codex ⚡️

Chinchilla Squeaks
Software supply chain security with Socket.dev

Chinchilla Squeaks

Play Episode Listen Later Apr 4, 2024 33:07


I speak with Feross Aboukhadijeh of Socket.dev about their smarter and more considered solution for securing software supply chains.

Cybercrime Magazine Podcast
Supply Chain Q&A. Implementing Software Supply Chain Security. Cassie Crossley, Schneider Electric.

Cybercrime Magazine Podcast

Play Episode Listen Later Mar 15, 2024 5:57


Cassie Crossley, author of the book “Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware,” is the VP, Supply Chain Security, Cybersecurity & Product Security Office at Schneider Electric. In this episode, she joins host Steve Morgan to discuss how organizations can implement software supply chain security. Supply Chain Q&A is sponsored by Sonatype, a leader in enterprise software supply chain management. To learn more about our sponsor, visit https://sonatype.com.

ITSPmagazine | Technology. Cybersecurity. Society
Book | Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware | A Conversation with Cassie Crossley | Redefining CyberSecurity Podcast with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 8, 2024 45:49


Guest: Cassie Crossley, VP, Supply Chain Security, Schneider Electric [@SchneiderElec]On LinkedIn | https://www.linkedin.com/in/cassiecrossley/On Twitter | https://twitter.com/Cassie_CrossleyOn Mastodon | https://mastodon.social/@Cassie_Crossley____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of the Redefining CyberSecurity Podcast, host Sean Martin chats with Cassie Crossley, Vice President for Supply Chain Security at Schneider Electric, and author of the book "Software Supply Chain Security". Crossley emphasizes the need for increased awareness and understanding of software supply chain security, not just among technology companies but also in the broader business sector including procurement, legal, and MBA graduates.Crossley highlights the intricate complexities involved in securing IT, OT and IoT ecosystems. These include dealing with decades-old equipment that can't easily be upgraded, and accounting for the constantly evolving nature of cybersecurity threats, which she likens to a 'Wild West' environment.Crossley brings attention to the importance of businesses understanding the risks and impacts associated with cyber vulnerabilities in their supply chain. She touches on the potential vulnerabilities of pre-installed apps on iPhones, the need for more memory-safe languages, and the complexities of patch management in OT environments.Additionally, Crossley talks about the potential for cyber disasters and the importance of robust disaster recovery processes. Discussing the EU Cyber Resilience Act, she raises an important issue about the lifespan of tech devices and the potential impact on the security status of older devices.To help businesses navigate these challenges, Crossley's book provides a holistic overview of securing end-to-end supply chains for software, hardware, firmware, and hardware; it is designed to serve as a practical guide for anyone from app developers to procurement professionals. She aims to enlighten and equip businesses to proactively address supply chain security, rather than treating it as an afterthought.Key Questions Addressed:What is the importance of software supply chain security in businesses?What are the challenges presented by OT environments when implementing cybersecurity measures?How can businesses proactively navigate these challenges and strengthen their supply chain security?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Redefining CyberSecurity
Book | Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware | A Conversation with Cassie Crossley | Redefining CyberSecurity Podcast with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Mar 8, 2024 45:49


Guest: Cassie Crossley, VP, Supply Chain Security, Schneider Electric [@SchneiderElec]On LinkedIn | https://www.linkedin.com/in/cassiecrossley/On Twitter | https://twitter.com/Cassie_CrossleyOn Mastodon | https://mastodon.social/@Cassie_Crossley____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of the Redefining CyberSecurity Podcast, host Sean Martin chats with Cassie Crossley, Vice President for Supply Chain Security at Schneider Electric, and author of the book "Software Supply Chain Security". Crossley emphasizes the need for increased awareness and understanding of software supply chain security, not just among technology companies but also in the broader business sector including procurement, legal, and MBA graduates.Crossley highlights the intricate complexities involved in securing IT, OT and IoT ecosystems. These include dealing with decades-old equipment that can't easily be upgraded, and accounting for the constantly evolving nature of cybersecurity threats, which she likens to a 'Wild West' environment.Crossley brings attention to the importance of businesses understanding the risks and impacts associated with cyber vulnerabilities in their supply chain. She touches on the potential vulnerabilities of pre-installed apps on iPhones, the need for more memory-safe languages, and the complexities of patch management in OT environments.Additionally, Crossley talks about the potential for cyber disasters and the importance of robust disaster recovery processes. Discussing the EU Cyber Resilience Act, she raises an important issue about the lifespan of tech devices and the potential impact on the security status of older devices.To help businesses navigate these challenges, Crossley's book provides a holistic overview of securing end-to-end supply chains for software, hardware, firmware, and hardware; it is designed to serve as a practical guide for anyone from app developers to procurement professionals. She aims to enlighten and equip businesses to proactively address supply chain security, rather than treating it as an afterthought.Key Questions Addressed:What is the importance of software supply chain security in businesses?What are the challenges presented by OT environments when implementing cybersecurity measures?How can businesses proactively navigate these challenges and strengthen their supply chain security?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

CISO Tradecraft
#171 - Navigating Software Supply Chain Security (with Cassie Crossley)

CISO Tradecraft

Play Episode Listen Later Mar 4, 2024 46:57 Transcription Available


In this episode of CISO Tradecraft, host G Mark Hardy converses with Cassie Crossley, author of the book on software supply chain security. Hardy explores the importance of cybersecurity, the structure of software supply chains, and the potential risks they pose. Crossley shares her expert insights on different software source codes and the intricacies of secure development life cycle. She highlights the significance of Software Bill of Materials (SBOM) and the challenges in maintaining the integrity of software products. The discussion also covers the concept of counterfeits in the software world, stressing the need for continuous monitoring and a holistic approach towards cybersecurity. Link to the Book: https://www.amazon.com/Software-Supply-Chain-Security-End/dp/1098133706?&_encoding=UTF8&tag=-0-0-20&linkCode=ur2 Transcripts: https://docs.google.com/document/d/1SJS2VzyMS-xLF0vlGIgrnn5cOP8feCV9 Chapters 00:00 Introduction 01:44 Discussion on Software Supply Chain Security 02:33 Insights into Secure Development Life Cycle 03:20 Understanding the Importance of Supplier Landscape 05:09 The Role of Security in Software Supply Chain 07:29 The Impact of Vulnerabilities in Software Supply Chain 09:06 The Importance of Secure Software Development Life Cycle 14:13 The Role of Frameworks and Standards in Software Supply Chain Security 17:39 Understanding the Importance of Business Continuity Plan 20:53 The Importance of Security in Agile Development 24:01 Understanding OWASP and Secure Coding 24:20 The Importance of API Security 24:50 The Concept of Shift Left in Software Development 25:20 The Role of Culture in Software Development 25:52 Exploring Different Source Code Types 26:19 The Rise of Low Code, No Code Platforms 28:53 The Potential Risks of Generative AI Source Code 34:24 Understanding Software Bill of Materials (SBOM) 41:07 The Challenge of Spotting Counterfeit Software 41:36 The Importance of Integrity Checks in Software Development 45:45 Closing Thoughts and the Importance of Cybersecurity Awareness

Cybercrime Magazine Podcast
Supply Chain Q&A. Software Supply Chain Security Regulations. Cassie Crossley, Schneider Electric.

Cybercrime Magazine Podcast

Play Episode Listen Later Mar 1, 2024 4:45


Cassie Crossley, author of the book “Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware,” is the VP, Supply Chain Security, Cybersecurity & Product Security Office at Schneider Electric. In this episode, she joins host Steve Morgan to discuss software supply chain security regulations, including whether there are any laws or standards in the industry. Supply Chain Q&A is sponsored by Sonatype, a leader in enterprise software supply chain management. To learn more about our sponsor, visit https://sonatype.com.

Cybercrime Magazine Podcast
Supply Chain Q&A. Understanding Software Supply Chain Security. Cassie Crossley, Schneider Electric.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 20, 2024 5:39


Cassie Crossley, author of the book “Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware,” is the VP, Supply Chain Security, Cybersecurity & Product Security Office at Schneider Electric. In this episode, she joins host Steve Morgan to discuss software supply chain security, including what it is and why it's important. Supply Chain Q&A is sponsored by Sonatype, a leader in enterprise software supply chain management. To learn more about our sponsor, visit https://sonatype.com.

Web and Mobile App Development (Language Agnostic, and Based on Real-life experience!)
Software Supply Chain Security and a Decoupled Architecture (feat. Tracy Ragan)

Web and Mobile App Development (Language Agnostic, and Based on Real-life experience!)

Play Episode Listen Later Feb 20, 2024 58:14


Tracy Ragan⁠ discusses software supply chain management and the importance of generating and consuming Software Bill of Materials (SBOMs) in decoupled architectures. She explains the challenges of managing libraries and dependencies in microservices and the need for aggregated SBOMs. Tracy emphasizes the importance of rapid response to vulnerabilities and the value of SBOMs in facilitating this response. She also discusses the requirements and industries for SBOMs and the role of SBOMs in analyzing and securing open source and commercial software. Tracy introduces ⁠DeployHub⁠ as a DevSecOps evidence store that helps teams gain confidence in the use and consumption of open source software and enables rapid response to vulnerabilities. Takeaways Software supply chain management involves generating and consuming SBOMs to track libraries and dependencies in decoupled architectures. In decoupled architectures, it is important to generate SBOMs for each microservice and aggregate them to understand the overall software supply chain. SBOMs should be generated for every build and provide visibility into the vulnerabilities and dependencies of each component. The quality of SBOMs is determined by their ability to facilitate rapid response to vulnerabilities and enable collaboration among teams. While SBOMs are not currently required in all industries, their importance is increasing, especially in sectors like government and fintech. Understanding the impact of vulnerabilities is crucial for effective response and prioritization. Rapid response to vulnerabilities is essential to minimize the potential impact on production environments. Centralized data and information are necessary for effective vulnerability management. Fixing vulnerabilities in open source software can be challenging due to the lack of accountability and maintenance. Controlling open source consumption and managing the software supply chain are complex tasks. DeployHub provides a DevSecOps evidence store that helps teams gain confidence in the use of open source software and enables rapid response to vulnerabilities. Chapters 00:00 Introduction to Software Supply Chain Management 03:22 Understanding Architecture in the Context of SBOMs 06:12 Configuration Management in Monolithic Applications 07:39 Challenges of Decoupled Architecture in Microservices 09:20 The Need for SBOMs in Decoupled Architectures 11:15 Generating Aggregated SBOMs for Microservices 13:24 Generating SBOMs for Each Microservice 15:23 Generating SBOMs for Every Build 17:15 Managing Libraries and Dependencies in Decoupled Architectures 19:31 The Importance of Consuming SBOM Data 22:30 Generating SBOMs with Tools 24:28 The Format and Consumption of SBOMs 27:55 The Importance of Consuming and Analyzing SBOM Data 29:43 Requirements and Industries for SBOMs 33:29 SBOMs for Open Source and Commercial Software 36:01 The Role of SBOMs in Rapidly Responding to Vulnerabilities 39:05 The Value of SBOMs in Rapid Response Systems 43:13 Defining the Quality of SBOMs 44:06 Understanding the Impact of Vulnerabilities 46:03 The Importance of Rapid Response 48:35 The Need for Centralized Data and Information 50:27 Challenges in Fixing Vulnerabilities 52:14 The Accountability of Open Source Software 53:41 The Difficulty of Controlling Open Source Consumption 55:16 Introduction to DeployHub 57:43 Managing the Software Supply Chain Tracy Ragan's Links: ⁠Linkedln Profile⁠ ⁠⁠DeployHub⁠⁠ Snowpal Products Backends as Services on ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠AWS Marketplace⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Mobile Apps on ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠App Store⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Play Store⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Web App⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Education Platform⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ for Learners and Course Creators

Application Security PodCast
Kyle Kelly -- The Dumpster Fire of Software Supply Chain Security

Application Security PodCast

Play Episode Listen Later Jan 30, 2024 41:17 Transcription Available


Kyle Kelly joins Chris to explore the wild west of software supply chain security. Kyle, author of the CramHacks newsletter, sheds light on the complicated and often misunderstood world of software supply chain security. He brings unique insights into the challenges, issues, and potential solutions in this constantly growing field. From his experiences in sectors like cybersecurity and security research, he adapts a critical perspective on the state of the software supply chain, suggesting it is in a 'dumpster fire' state. We'll dissect that incendiary claim and discuss the influence of open-source policies, the role of GRC, and the importance of build reproducibility. From starters to experts, anyone with even a mild interest in software security and its future will find this conversation enlightening.Links:CramHacks - https://www.cramhacks.com/Solve for Happy by Mo Gawdat - https://www.panmacmillan.com/authors/mo-gawdat/solve-for-happy/9781509809950FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

EM360 Podcast
CloudSEK: The Future of Software Supply Chain Security

EM360 Podcast

Play Episode Listen Later Jan 30, 2024 14:10


In the world of complex supply chains, it's not enough to secure our own data but also ensuring that third party vendors we work with have robust security.When it comes to proactively stopping threats and mitigating issues, supply chain monitoring and ensuring a secure software supply chain is crucial to keep organizations' data safe. In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Rahul Sasi, Co-Founder and CEO at CloudSEK, to discuss: Current state of cloud computing securityCommon vulnerabilities in the software supply chainRemote work, cloud reliance and mitigating risk

Absolute AppSec
Episode 231 - FlowMate, State of Software Supply Chain Security

Absolute AppSec

Play Episode Listen Later Jan 23, 2024


Seth and Ken are back after a weeks hiatus and start by demonstrating FlowMate, a newly released Burp Extension for building context of the parameters used by an application. This is followed by in-depth analysis of Reversing Lab's State of Software Supply Chain Security Report.

The Cyberman Show
Key learnings from the State of Software Supply Chain Security 2024 by Reversing labs? #72

The Cyberman Show

Play Episode Listen Later Jan 21, 2024 12:38


Send us a Text Message.today, I share what I learnt from the recent report that I read from Reversing labs on software supply chain security. Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.

Future of Application Security
EP 53 — ReversingLabs's Dave Ferguson on Securing Your Software Supply Chains

Future of Application Security

Play Episode Listen Later Jan 17, 2024 24:24


In this episode of the Future of Application Security, Harshil speaks with Dave Ferguson, Director of Technical Product Management, Software Supply Chain Security at ReversingLabs, which offers software supply chain security analysis platform. They discuss the rising need for software supply chain security as a result of the complexities around how software is built today. They also talk about ways to identify novel attacks through analyzing software behaviors, how efforts like SBOMs and registries help increase transparency, and why software supply chain security needs to evolve from just looking for vulnerabilities. Topics discussed: How Dave's diverse background in security, as well as his piqued interest around the SolarWinds and 3CX attacks, led to his focus on software supply chain security today. How a product manager leads by working with development teams, meeting with customers, incorporating new features and integrations, and helping bring new solutions to market. How the complexities associated with building software today — like open source and automation — have increased the possibility of adversaries slipping in.  Why analyzing software behavior across previous builds and seeing what's changed can help flag novel attacks. Today's trends that are increasing transparency in software creation, including the rising demand for SBOMs and the possibility of trust registries for commercial software. Why software supply chain security approaches need to move beyond just looking at vulnerabilities to find ways to root out all malicious activity. DOWNLOAD: Today, most application security tools are designed to find vulnerabilities, not fix them. What is noise and what is risk? And, more importantly, how do you accelerate the remediation of the most critical vulnerabilities? The answer lies within one key metric — Mean Time to Remediate (MTTR) Taking a better strategy to decrease your MTTR and keep your organization safe can begin today — download the paper to learn how.

Absolute AppSec
Episode 229 - Software Supply Chain Security, 2024 Predictions

Absolute AppSec

Play Episode Listen Later Jan 2, 2024


Seth and Ken kick off a new year talking about recent news, including improvements in security process for software supply chains. This is followed by security predictions for 2024, including LLMs, dynamic scanning, process, and other possibilities in the near future.

Cloud Security Podcast
Kubernetes Security Trends 2024 | Software Supply Chain Security, Zero Trust and AI

Cloud Security Podcast

Play Episode Listen Later Dec 13, 2023 33:11


Kubernetes is shaping the future of cloud native technology with interest from security folks, businesses and developers - what does the future of Kubernetes Security look like? At Kubecon NA 2023, we spoke to Emily Fox who is the chair of CNCF's Technical Oversight Committee and Software Engineering Lead at RedHat about how Zero Trust plays out in the Kubernetes environment, challenges and solutions in securing the software supply chain within Kubernetes, the impact of AI workloads on Kubernetes and future of Edge Computing and Kubernetes. Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security Podcast- Youtube - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠⁠ Questions Asked: (00:00) Introduction (02:23) A bit about Emily (02:51) What is Supply Chain Security? (03:51) What triggered this conversation? (05:10) Supply Chain Security in Managed Kubernetes (06:07) What is Zero Trust? (07:24) Implementing Zero Trust (09:29) The role of Security and Compliance (11:13) Compliance as code in Kubernetes (13:22) What is Edge? (17:41) The impact of AI on Security (20:39) Detection for AI and Kubernetes (22:29) How are the skillsets changing? (25:00) Security for Open Source Projects (28:01) The fun section

Software Engineering Daily
Software Supply Chain Security with Michael Lieberman

Software Engineering Daily

Play Episode Listen Later Dec 6, 2023 43:06


One of the most famous software exploits in recent years was the SolarWinds attack in 2020. In this attack, Russian hackers inserted malicious code into the SolarWinds Orion system, allowing them to infiltrate the systems of numerous corporations and government agencies, including the U.S. executive branch, military, and intelligence services. This was an example of The post Software Supply Chain Security with Michael Lieberman appeared first on Software Engineering Daily.

Security – Software Engineering Daily
Software Supply Chain Security with Michael Lieberman

Security – Software Engineering Daily

Play Episode Listen Later Dec 6, 2023 43:06


One of the most famous software exploits in recent years was the SolarWinds attack in 2020. In this attack, Russian hackers inserted malicious code into the SolarWinds Orion system, allowing them to infiltrate the systems of numerous corporations and government agencies, including the U.S. executive branch, military, and intelligence services. This was an example of The post Software Supply Chain Security with Michael Lieberman appeared first on Software Engineering Daily.

Podcast – Software Engineering Daily
Software Supply Chain Security with Michael Lieberman

Podcast – Software Engineering Daily

Play Episode Listen Later Dec 6, 2023 43:06


One of the most famous software exploits in recent years was the SolarWinds attack in 2020. In this attack, Russian hackers inserted malicious code into the SolarWinds Orion system, allowing them to infiltrate the systems of numerous corporations and government agencies, including the U.S. executive branch, military, and intelligence services. This was an example of The post Software Supply Chain Security with Michael Lieberman appeared first on Software Engineering Daily.

Resilient Cyber
S5E5: Greg Rasner - Zero Trust and Third Party Risk Management

Resilient Cyber

Play Episode Listen Later Oct 15, 2023 37:17


- You recently wrote a book titled Zero Trust and Third Party Risk. Can you tell us a bit about the book, why you wrote it and how you see the convergence of ZT and TPRM?- There's been a lot of discussion lately around Software Supply Chain Security, but also Cybersecurity Supply Chain Risk Management, or C-SCRM. Do you see the former being part of the latter, and what challenges do you think organizations face trying to tackle both?- TPRM often involves manual subjective lengthy questionnaires that we are all painfully familiar with. How effective do you think these are and do you think we are going to see a future based on machine-readable attestations and more automated assessments to augment some of the traditional manual questionnaire type activities?- Most organizations struggle to implement fundamental security practices and processes within their own organization, let alone thoroughly ensuring all of their 3rd and nth tier suppliers are, is this a gordian knot type situation?- What are your thoughts on first party self-attestations vs 3rd party assessments? Each has its pros and cons and challenges. - The name Zero Trust is a bit of a misnomer, as we know it means no implicit trust, and it also seems a little counter-intuitive in our increasingly inter-connected ecosystem and society. How do you see the push for Zero Trust playing out when we look at the broader supply chain ecosystem?

Application Security PodCast
François Proulx -- Actionable Software Supply Chain Security

Application Security PodCast

Play Episode Listen Later Jun 22, 2023 42:04 Transcription Available


Software supply chain -- how deep does the problem go? François is here to help us realize how deep the rabbit hole of the supply chain is and enlighten us with strategies to get out of the hole.François emphasizes the importance of branch protection in source code repositories as the cornerstone of any supply chain, highlighting the need for peer review and static code analysis before merging. He also discusses the concept of tag protection, which prevents anyone with rewrite access to the repository from modifying a tag. This is particularly important in the context of build systems, where an overwritten tag could compromise the entire system.The conversation then shifts to a "Let's Encrypt" equivalent for package signing, which François believes is being addressed by the SIG store project. This project introduces the concept of keyless signatures, which eliminates the need to manage private keys, a process that can be risky and cumbersome.François also discusses the importance of understanding your dependency tree and using package manager lock files to ensure that the version of a package you're downloading is the one you expect. He mentions the Terraform modules, where the lack of a lock file for modules can lead to security vulnerabilities.Toward the end of the episode, François recommends listeners explore the OpenSSF (Open Source Security Foundation) and its various projects, such as the Scorecard project, which provides a security posture for your repo. He also mentions https://deps.dev, a free Google service that scans open-source repos and runs the Scorecard on those projects.Look up towards the light if you find yourself at the bottom of the rabbit hole.FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Resilient Cyber
S4E20: Luke Hinds & Craig McLuckie - The Founders Journey & Software Supply Chain Security

Resilient Cyber

Play Episode Listen Later May 31, 2023 37:41


- First off, can you each tell us a bit about your backgrounds and experience in the space?- What made you all decide to found Stacklok, what gaps and opportunities in the ecosystem did you see?- What are your thoughts around the industry's response to software supply chain security and how do you see things such as OSS and Sigstore playing a role?- While we've seen tremendous adoption of OSS and for reasons such as speed to market, the robust OSS community, innovation and more, as you both know, OSS has its concerns too, such as pedigree/provenance, known vulnerabilities, lack of maintenance and support etc. How do organizations balance these concerns while still taking advantage of OSS?- No software supply chain security discussions would be complete without touching on SBOM, which has gotten a lot of industry attention on the topics. What are each of your thoughts on SBOM?- Another topic that is around every corner lately is AI and the disruption it will cause. We're seeing organizations integrate and market AI into every possible use case when it comes to cybersecurity while there is also a lot of FUD about malicious actors using AI and even calling it a possible "extinction event". What is your take on AI and the role it is and will have on software supply chain and cyber?

Secure Ventures with Kyle McNulty
Oligo: Gal Elbaz on Hacking Instagram and Software Supply Chain Security

Secure Ventures with Kyle McNulty

Play Episode Listen Later May 30, 2023 40:02


Gal: CTO and co-founder at Oligo, providing a runtime solution for software supply chain security Worked at Checkpoint for 7 years Started his security journey in the IDF Met his co-founders as a child, and they conspired to start a company together for decades before launching Oligo! Check out the episode for our discussion of his hack of instagram, how Oligo gets creative with reaching inundated CISOs, and how AI has changed the software supply chain landscape. https://www.oligo.security/

Cloud Security Podcast by Google
EP116 SBOMs: A Step Towards a More Secure Software Supply Chain

Cloud Security Podcast by Google

Play Episode Listen Later Apr 10, 2023 29:50


Guest: Isaac Hepworth, PM focused on Software Supply Chain Security @ Google Cooked questions: Why is everyone talking about SBOMs all of a sudden? Why does this matter to a typical security leader? Some software vendors don't want SBOM, and this reminds us of the food safety rules debates in the past, how does this analogy work here? One interesting challenge in the world of SBOMs and unintended consequences is that large well resourced organizations may be better equipped to produce SBOMs than small independent and open source projects. Is that a risk? Is the SBOM requirement setting the government up to be overly reliant on megacorps and are we going to unintentionally ban open source from the government?  What is the relationship between SBOM and software liability? Is SBOM a step to this? Won't software liability kill open source? How does Google prepare for EO internally; how do we use SBOM and other related tools? To come back to the food analogy, SBOMs are all well and good, but the goal is not that consumers know they're eating lead, but rather that our food becomes healthier. Where are we heading in the next five years to improve software supply chain "health and safety"? Resources: Full video of this episode (YouTube / LinkedIn) “Executive Order on Improving the Nation's Cybersecurity” “M-22-18 Memorandum For The Heads of Executive Departments and Agencies“ SLSA.dev  “How to SLSA Part 3 - Putting it all together” Assured Open Source Software NIST Secure Software Development Framework (SSDF) “Linking Up The Pieces: Software Supply Chain Security at Google and Beyond” (ep24) “2022 Accelerate State of DevOps Report and Software Supply Chain Security” (ep100)

Resilient Cyber
S4E11: John Speed Meyers - Data Science & Software Supply Chain Security

Resilient Cyber

Play Episode Listen Later Mar 31, 2023 36:34


Chris: I have been following your research for several years now, dating back to your role before Chainguard. As you have watched the conversation around Software Supply Chain Security unfold in the industry, do you feel like we're making positive headway?Chris: You have done a lot of research into software supply chain security, and of course SBOM's. One recent study you took a look at the quality of SBOM's in the OSS ecosystem, compared to say the NTIA defined minimum elements for SBOM. Can you tell us a bit about the study and implications of the findings?Chris: In addition to SBOM, we're seeing the emergence of VEX, can you speak a bit about its importance?Chris: I wanted to follow up about OSS, since it has become such a core aspect of the software supply chain conversation. I'm sure based on your studies you know the phrase dubbed Linus' Law, which states that "with enough eyeballs all bugs are shallow" but based on my research for writing a book recently, I realized that the overwhelming majority of OSS projects lack enough eyeballs. Do you think this is a challenge when we look at the widespread adoption of OSS?Chris: Can you tell us a bit about your next/current efforts for software supply chain security research?

The Secure Developer
Ep. 129 The Future of Software Supply Chain Security

The Secure Developer

Play Episode Listen Later Feb 27, 2023 19:52


In this episode, we conclude our miniseries dealing with software supply chain security by considering the next five years in the space, what we need, and what we can hope for. Emily Fox, Aeva Black, Brian Behlendorf, Adrian Ludwig, Lena Smart, and of course Guy Podjarny, join Simon by sharing some insights on the areas in most need of attention, and where we can realistically expect to make progress in the near future. Listeners will hear about trust and tooling, downstream complexities, and qualifying security engineers, with the conversation ending on an optimistic note with an eye to the horizon. For most of our panel, the message of consistent attention and security prioritisation within organisations, as well as from governance is paramount to the health of any of these systems. So to hear it all in this final installment of our special, be sure to press play now!

ITSPmagazine | Technology. Cybersecurity. Society
The Impact Of Log4j Since Its Disclosure | Steps Businesses Can Take To Maintain Software Supply Chain Security | Part 2 Of 2 | An Imperva Story With Peter Klimek

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 23, 2023 23:17


In this second episode, we take a closer look at Log4j and what business/operations impacts it had on organizations faced with the attacks against the vulnerability. We also get to hear about some successful mitigation measures Imperva customers used to mitigate the impact of Log4j and take that to the next level for some actionable steps companies can take to prepare for other supply chain vulnerabilities.Note: This story contains promotional content. Learn more.Guest: Peter Klimek, Director of Technology - Office of the CTO at Imperva [@Imperva]On LinkedIn | https://www.linkedin.com/in/peter-klimek-37588962/ResourcesLearn more about Imperva and their offering: https://itspm.ag/imperva277117988Blog: Log4j: One Year LaterSolution page: Stopping software supply chain attacksLearning center: Supply Chain AttackLearning center: Zero-day (0day) exploitNational Telecommunications and Information Administration: Software Bill of MaterialsNational Telecommunications and Information Administration: Vulnerability-Exploitability eXchangePodcast Part 1 of 2: https://redefining-cybersecurity.simplecast.com/episodes/the-impact-of-log4j-since-its-disclosure-steps-businesses-can-take-to-maintain-software-supply-chain-security-part-1-of-2-an-imperva-story-with-gabi-stapelAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
The Impact Of Log4j Since Its Disclosure | Steps Businesses Can Take To Maintain Software Supply Chain Security | Part 1 Of 2 | An Imperva Story With Gabi Stapel

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 16, 2023 23:17


The December 2021 log4j vulnerability was a major event in the cybersecurity world. When it was released and exposed to the internet, it caused an explosion in attacks with five and a half million attacks per day and up to 25,000 sites attacked per hour. The vulnerability affects any system running that version of Java lookup and could be at risk, even if it is only exposed internally to insiders. The attackers initially used scanning and checking to see which sites were vulnerable, and then it was automated. Attack tools were created to make it easier for attackers to reach as many targets as possible. Public awareness campaigns have been effective, but vulnerabilities can reappear due to the prevalence of the software. 72% of organizations still had some level of vulnerability to log4j as of October 2022.As captured in this episode, remediation is not a one-and-done solution, as seen with Log4j, where organizations would fix the problem, and then it would come right back due to the prevalence of the software and how deep it went. The importance of API security is emphasized since 15% of the numbers were coming from APIs. The need to check and document new things added to the system is crucial to maintain proper documentation and be up on remediation. In short, software supply chain security is critical.Note: This story contains promotional content. Learn more.Guest: Gabi Stapel, Content Manager @ Imperva Threat Research [@Imperva]On LinkedIn | https://www.linkedin.com/in/gabriella-stapel/On Twitter | https://twitter.com/GabiStapelResourcesLearn more about Imperva and their offering: https://itspm.ag/imperva277117988Blog: Log4j: One Year LaterSolution page: Stopping software supply chain attacksLearning center: Supply Chain AttackLearning center: Zero-day (0day) exploitNational Telecommunications and Information Administration: Software Bill of MaterialsNational Telecommunications and Information Administration: Vulnerability-Exploitability eXchangeAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

All TWiT.tv Shows (MP3)
FLOSS Weekly 712: Software Supply Chain Security

All TWiT.tv Shows (MP3)

Play Episode Listen Later Dec 21, 2022 61:08


Dan Lorenc of Sigstore and Chainguard joins Doc Searls and Katherine Druckman on FLOSS Weekly to discuss the software supply chain.The open source software supply chains are increasingly vulnerable attack surfaces. Nobody knows more, or is doing more, to secure those surfaces than Dan Lorenc. Hosts: Doc Searls and Katherine Druckman Guest: Dan Lorenc Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: Code Comments

Packet Pushers - Full Podcast Feed
Network Break 408: Arista Launches Network Automation Pipeline; Palo Alto Targets Software Supply Chain Security

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Nov 21, 2022 49:47


Take a Network Break! This week we cover a new continuous integration pipeline from Arista Networks to support network automation, Cisco's intention to open a new silicon design center in Spain, and Apple spending $450 million to support emergency text messaging using satellites. We also discuss Palo Alto Networks spending $195 million for Cider Security, financial results, and more.

Packet Pushers - Full Podcast Feed
Network Break 408: Arista Launches Network Automation Pipeline; Palo Alto Targets Software Supply Chain Security

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Nov 21, 2022 49:47


Take a Network Break! This week we cover a new continuous integration pipeline from Arista Networks to support network automation, Cisco's intention to open a new silicon design center in Spain, and Apple spending $450 million to support emergency text messaging using satellites. We also discuss Palo Alto Networks spending $195 million for Cider Security, financial results, and more. The post Network Break 408: Arista Launches Network Automation Pipeline; Palo Alto Targets Software Supply Chain Security appeared first on Packet Pushers.

The CyberWire
Amid widespread unrest, Sudan shutters its Internet. A new PRC influence campaign targets US elections. Software supply chain security. And cybercrime in wartime.

The CyberWire

Play Episode Listen Later Oct 26, 2022 31:30


Sudan closes its Internet as the country sees protests on the first anniversary of a coup. A Chinese influence campaign targets US elections. A software supply chain security study, and a look at vulnerability scanning tools. Documenting cyber war crimes in Ukraine. CISA issues eight ICS Advisories. Andrea Little Limbago from Interos on the effects of water scarcity on data centers. And if you'll indulge us, we've got some pretty exciting CyberWire news. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/206 Selected reading. Internet is shut down in Sudan on anniversary of military coup (The Record by Recorded Future) Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections (Mandiant) Rezilion Vulnerability Scanner Benchmark Report Finds Top Scanners Only 73% Accurate (PR Newswire)  Four in Five Software Supply Chains Exposed to Cyberattack in the Last 12 Months (BlackBerry) Ukraine Documenting Russian Hacks, Eyeing International Charges (Bloomberg)  CISA Releases Eight Industrial Control Systems Advisories (CISA)