Breaking
February 12, 2025

Removing software supply chain blind spots that put public sector organizations at risk | usagoldmines.com

Do you regularly assess the security posture of your software providers? It’s not a question most people are used to answering. For IT leaders, however, it’s an increasingly familiar concern – particularly within critical public sectors like healthcare, education and government.

While most public sector IT leaders feel confident about their software security posture, our research revealed that 51% of them uncovered hidden participants in their software supply chains last year. Even more troubling, over half of decision-makers across healthcare, education and government organizations reported receiving notifications of an attack or vulnerability within the past twelve months. Of those affected, 42% of organizations took over a week – or longer – to recover.

Public sector industries that deliver vital services are particularly vulnerable. In fact, BlackBerry Threat Intelligence shows that almost two-thirds (62%) of sector-specific attacks target these critical industries, due to their reliance on outdated systems, limited cybersecurity resources, and the high value of the sensitive data they hold. However, as these industries increasingly adopt digital solutions to enhance operations, they also become prime targets for cybercriminals seeking to exploit vulnerabilities and disrupt essential services.

At the heart of these attacks lies a targeted exploitation of trust. Attackers manipulate the components of software development and distribution, infiltrating systems by exploiting third-party tools or dependencies and even deliberately embedding vulnerabilities that often then remain undetected until they are exploited.

In August, 2024, the UK government published its Code of Practice for Software Vendors, a voluntary set of guidelines to help organizations develop and use technologies to counter cyber-attacks like the one experienced by Transport for London (TfL).

These are steps in the right direction, but public sector organizations can also harness innovative approaches and technologies to counter the escalating threat. So, how can they do so at a time when they are being tasked to implement best practice using the same resources or even less?

Supply chain security blind spots

“Software is a fundamental building block for digital technologies,” begins the government’s policy paper. The policy paper underscores the foundational role of secure software in enabling productivity and growth.

The reality is the interconnected nature of today’s supply chains means security risks now extend beyond primary suppliers to third, fourth, and even eighth-party vendors, that may vary from highly organized companies with robust controls, right down to individuals who supply and service the myriad vendors and partners in the supply chain. When compliance and data privacy are lacking at any point along this chain, it can trigger far-reaching consequences, exposing companies to malicious attacks and operational disruptions.

Getting this wrong can be extremely costly. Our research revealed that IT leaders reported financial loss (71%), data loss (67%), reputational damage (67%), operational impact (50%), and intellectual property theft (38%) were the biggest challenges faced after an attack or vulnerability in their software supply chain in 2024.

One reason for the rise in supply chain software attacks is the high level of trust IT leaders place in their suppliers. Fewer than half (47%) of public sector IT decision-makers request proof of compliance with certifications or standard operating procedures, and fewer still seek third-party audit reports (38%) or evidence of internal security training (32%).

While this degree of trust and confidence in service providers helps foster partnerships, this shouldn’t come at the expense of ignoring blind spots in the software supply chain. Ultimately, how a company monitors and manages cybersecurity in its software supply chain must rely on more than just trust – and IT leaders and their suppliers must tackle the lack of visibility as a priority.

Enhancing visibility through rigorous supply chain security

Fortunately, public sector organizations have several defense options. First, they should look to reduce the attack surface of the software supply chain by minimizing the number of potential points where an attacker can exploit vulnerabilities. Here, they should identify and investigate every step of the supply chain. This should include a deep dive into partner applications to ensure they too are secure and make penetration testing a regular activity to continually verify the status.

Second, organizations must verify the identity and practices of their service providers, including testing third-party software before deployment and requiring vendors to adhere to well-established security policies. End-to-end encryption, robust privacy policies, and enterprise-grade controls and reporting are vital to reducing supply chain vulnerabilities. By validating each of user identities, cryptographic measures and isolation of sensitive data, these safeguards will better protect against malware and unauthorized access.

Finally, effective incident response plans are crucial; it’s wise to base the plans on the assumption that a software supply chain attack is inevitable. These plans should include six stages: preparation, identification, containment, eradication, recovery, and assessment. BlackBerry operates – and advise others to operate – on a Zero Trust principle, reducing the risk of hidden and unknown participants in the supply chain.

A robust IR plan should not rely on the regular IT tools themselves for communication and workflow during an incident, (as these may well be compromised or inaccessible) but have recourse to out of band communications and workflow, an isolated recovery environment and use administrative credentials that are different to those used by the regular IT and Security toolsets (since those credentials are also often compromised in supply chain attacks).

The road ahead

Of course, there is no quick fix to software supply chain problems. There is an ongoing talent shortage of experienced cybersecurity workers, and those available are already burdened with the challenges of keeping an organization’s own systems patched and updated. Our research highlights the key challenges facing IT public sector professionals, include insufficient technical expertise (49%) and inadequate tooling (38%). However, automation and exploitation of GenAI powered processes could address many of these issues in future, but equally, add to the complexity of the software supply chain itself.

AI-enabled Managed Detection and Response (MDR) technologies offer a cost-effective and practical solution to these issues. Specifically, they enable continuous monitoring of endpoints, networks, and cloud environments while connecting organizations with Security Operations Centre (SOC) analysts to address internal skill gaps. Unlike traditional cybersecurity services, which operate passively in the background, MDR combines advanced threat detection technologies with human expertise for a more proactive defense.

The road ahead calls for a multifaceted approach, including a combination of automation and proactive defense strategies and the Zero Trust principle. Equally important is a robust Incident Response plan that features out of band messaging communications and independent tools and processes that can minimise the exposure and speed the recovery. By leveraging advanced technologies alongside human expertise to remove blind spots, public sector IT leaders will have greater confidence in their organization’s resiliency against more sophisticated software supply chain threats.

The go-live of the DORA directive, which requires UK financial entities involved in cross-border operations to comply with EU supply chain legislation, has not inspired confidence among cybersecurity experts. Much like the NIS2 compliance deadline, there are doubts about organizations’ readiness, particularly in meeting supply chain audit requirements for partners and suppliers.

The increasing complexity of software supply chains, coupled with challenges in preparing accurate Software Bills of Materials (SBOMs), is further compounded by the growing adoption of generative AI. This shift introduces the need for AI-BOMs and adds new layers of difficulty. As software engineering advances rapidly, legislation will need to adapt, placing even greater scrutiny on the software supply chain.

We list the best Enterprise Resource Planning (ERP) software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Grab Reddit’s favorite desk chair for a gigantic 54% off | usagoldmines.com

Windows 11’s February update brings some welcome improvements | usagoldmines.com

What to Do If You Receive Someone Else's Mail Stephen Johnson | usagoldmines.com

The Arlo Video Doorbell 2K Is at Its Lowest Price Right Now Pradershika Sharma | usagoldmines.com

'New' iPhone SE Product Listing Appears on French Website Joe Rossignol | usagoldmines.com

Woot's New Sale Introduces Big Savings on Earbuds and Headphones From Beats, JBL, and More Mitchel B...

Kuo: Apple Robots Likely to Enter Mass Production in 2028 or Later Joe Rossignol | usagoldmines.com

Eclipsa Audio, the new Dolby Atmos competitor, is coming to Google TV sets and LG TVs – but we're st...

Don’t fall for these AI chatbot scams this Valentine’s Day – here’s how they could play with your he...

I matched Mistral AI's new Le Chat app against ChatGPT, and it did surprisingly well erichs211@gmail...

You can now get AirPods in 'neutral' skin-tone colors, but you'll pay a premium for them | usagoldm...

Leica could launch a controversial M-series camera this year with a new kind of viewfinder – it soun...

Ivanti reveals major security update, so make sure you're protected | usagoldmines.com

Apple just unveiled its most ambitious health study yet – here's how you can take part with just an ...

SonicWall VPN flaw could allow hackers to hijack your sessions, so patch now | usagoldmines.com

NIS2: the GDPR of cybersecurity | usagoldmines.com

Adobe Firefly muscles into AI video–here’s what it looks like | usagoldmines.com

Marvel Rivals has a chance to soar where Overwatch flopped | usagoldmines.com

Today’s best laptop deals: Save big on work, school, home use, and gaming | usagoldmines.com

What People Are Getting Wrong This Week: Are Bill Burr and Billy Corgan Brothers? Stephen Johnson | ...

Apple Announces New Health Study Involving the iPhone, Apple Watch, and AirPods Joe Rossignol | usag...

'We've never seen it in the MCU before': Captain America 4 director Julius Onah explains why Brave N...

Adobe Firefly unveils first video generation model that it says is "safe to use" | usagoldmines.com

Huge Christmas data breach - 14 million shipping records leaked, putting shoppers at risk | usagold...

After Putin sacked Russia’s space chief, the rumor mill is running red-hot Eric Berger | usagoldmine...

Google's Next Budget Phone Virtually Eliminates the Camera Bump Tim Hardwick | usagoldmines.com

Apple Taps Ultra-Thin Glass Suppliers for First Foldable Device Tim Hardwick | usagoldmines.com

WhatsApp Will Soon Let Users Add Instagram Links to Profiles Tim Hardwick | usagoldmines.com

Microsoft finally fixes some of Windows 11’s most annoying problems with new patch | usagoldmines.c...

Finally: You can now move your iPhone and iPad purchases to the same account – here's how to do it j...

We've barely seen AMD's RDNA 4 GPUs in action yet, but a new rumor suggests we could be getting an N...

Almost all firms are still reliant on spreadsheets - is it time for change? | usagoldmines.com

Garmin finally has a diving-watch option to rival the Apple Watch Ultra 2: Meet the Descent G2 steph...

Best VPN for streaming Netflix 2025: Watch from wherever you are | usagoldmines.com

Best smart speakers & displays for state-of-the-art smart homes | usagoldmines.com

Want to run AI on your PC? You’re gonna need a bigger hard drive | usagoldmines.com

Do more with VLC: 9 little-known features that go beyond playing videos | usagoldmines.com

Wes Anderson’s The Phoenician Scheme is arriving sooner than you think, and I'm hugely excited for M...

If the new iPhone SE 4 gets this rumored price hike, I'll struggle to recommend it jamie.richards@fu...

Businesses want to turn to AI for more specialized tasks, but aren't always sure how | usagoldmines...

The viral Ninja Creami Swirl ice cream maker is finally on sale, and I can't wait to start making pr...

Monster Hunter Wilds producer discusses potential Nintendo Switch 2 port: 'we'd need to take our tim...

An update on highly anticipated—and elusive—Micro LED displays Scharon Harding | usagoldmines.com

How to go fishing for life on another planet (or moon) Jacek Krywko | usagoldmines.com

iPhone 16 Pro Max Beaten by Samsung Galaxy S25 Ultra in App Loading Speed Test Tim Hardwick | usagol...

'It sets you up for what comes next': Captain America: Brave New World director offers cryptic reply...

Microsoft just patched a host of worrying security issues, so update now | usagoldmines.com

Is this the iPhone SE 4? New Apple device seemingly appears in leaked images as revised release date...

Why is AI in everything these days? What you need to know about the world’s favorite buzzword | usa...

Currys is the latest UK retailer to let you register interest in Nintendo Switch 2 news and potentia...

Nvidia RTX 5070 Ti early pricing rumors are making me fear the worst for the cost of this mid-range ...

US, UK crack down on Russian bulletproof hosting service ZServers for LockBit partnership | usagold...

As the ‘age of AI’ beckons, it’s time to get serious about data resilience | usagoldmines.com

PlayStation State of Play live build-up – start time, rumors, and all our predictions and hopes ahea...

New iPad Air and iPad 11 edge closer to launch – here’s when to expect them alexblake.techradar@gmai...

The Samsung Galaxy S25 Edge has appeared on Geekbench with so-so performance scores – but we're not ...

This new technology means battery-powered cameras can record more and last longer | usagoldmines.co...

How to Increase C Drive Space | usagoldmines.com

How to Clone Hard Drive on Windows 11 | usagoldmines.com

Apple Watch Series 10 users are reporting speaker volume issues – are you affected? stephen.warwick@...

Don’t wait for tax season panic — get this tax software deal before it’s gone | usagoldmines.com

Tackling social media fraud with graph databases | usagoldmines.com

Apple is reportedly partnering with Alibaba in China for AI features, and it makes sense after DeepS...

Gurman: iPhone SE 4 Coming 'By Next Week,' Other Announcements Starting Tomorrow Eric Slivka | usago...

Apple Now Lets You Move Digital Purchases From One Apple Account to Another Juli Clover | usagoldmin...

Use This App Instead of Excel to Directly Edit CSV Files Justin Pot | usagoldmines.com

Apple's Powerbeats Pro 2 Have a Built-In Heart Rate Monitor Jake Peterson | usagoldmines.com

ColorWare Launches New 'Blended' Custom AirPods Colors Juli Clover | usagoldmines.com

Tariffs will “blow a hole” in the US auto industry, says Ford CEO Jonathan M. Gitlin | usagoldmines....

When software updates actually improve—instead of ruin—our favorite devices Scharon Harding | usagol...

My Favorite Deals on Tech and Appliances From Best Buy's Presidents Day Sale Daniel Oropeza | usagol...

Google just set the date for I/O 2025, and get ready for the next big version of Gemini jacob.krol@f...

Apple contemplates SMB, enterprise as its next major revenue stream as it launches a new partner pro...

New hack uses prompt injection to corrupt Gemini’s long-term memory Dan Goodin | usagoldmines.com

Google I/O 2025 is Happening May 20-21 Kellen | usagoldmines.com

Where to Find Accurate Medical Info Recently Removed From the CDC's Site Beth Skwarecki | usagoldmin...

'Finch' Motivates Me to Complete My To-do List Without Shaming Me Lindsey Ellefson | usagoldmines.co...

This BBC Study Shows How Inaccurate AI News Summaries Actually Are Michelle Ehrhardt | usagoldmines....

New Powerbeats Pro 2 Will Have Day One Firmware Update Juli Clover | usagoldmines.com

Apple Adopting 'Gulf of America' Naming for Apple Maps Juli Clover | usagoldmines.com

NYT Strands hints and answers for Wednesday, February 12 (game #346) | usagoldmines.com

NYT Connections hints and answers for Wednesday, February 12 (game #612) | usagoldmines.com

Quordle hints and answers for Wednesday, February 12 (game #1115) | usagoldmines.com

Hackers offer 20 million OpenAI credentials for sale, but it says there's no evidence of a breach |...

Biggest Google Pixel 9a leak so far reveals colors and seems to confirm the death of the camera bar ...

Judge orders Trump admin. to restore CDC and FDA webpages by midnight Beth Mole | usagoldmines.com

Grab this 27-inch Acer OLED gaming monitor for 50% off today | usagoldmines.com

What to Say to Get Out of Jury Duty Meredith Dietz | usagoldmines.com

This tiny 2TB portable SSD has a unique feature that makes it the perfect storage companion for your...

Jura's new coffee machine brews hot or cold and can even add your choice of syrup | usagoldmines.co...

Fastest VPN 2025: We identify the speediest performers | usagoldmines.com

5 sneaky ways hackers use generative AI to scam you | usagoldmines.com

A beginner’s guide to using a Chromebook | usagoldmines.com

The winner of Newegg’s PC building race finished in under 5 minutes | usagoldmines.com

Notepad has spell check. Here’s how to turn it on or off | usagoldmines.com

Galaxy S25 Ultra Review: Same Price, But Some Nice Upgrades Tim | usagoldmines.com

How to Get Free Car Maintenance and Repair Work Jeff Somers | usagoldmines.com

Samsung HBM roadmap shows Google could become Nvidia's fiercest competitor in AI by 2026, but I wond...

Sony’s next flagship wireless headphones just edged closer to launch – here’s when they might land h...

Google's stronghold on search is loosening ever so lightly, report finds, but don't expect it to cru...

Leave a Reply