Most businesses remain woefully unprepared for the next major supply chain attack

Supply Chain
(Image credit: Shutterstock.com / TMLsPhotoG)

Many businesses are woefully unprepared to defend against supply chain cyberattacks, despite a number of successful high-profile incidents and the increase in awareness, new research has found.

A poll of 1,000 CIOs by Venafi found 82% of respondents saying they would be vulnerable to cyberattacks targeting software supply chains. 

Since the Covid-19 pandemic, and the increasing speed of development (thanks to technologies such as DevOps), securing the supply chain has become an infinitely more complex task, the report has found. The way software engineers behave isn’t helping, either. Almost nine in ten (87%) of CIOs believe software engineers and developers compromise on security policies and controls in order to get new products and services to market faster.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Improving security

As a result, businesses are more vulnerable, with incidents such as SolarWinds or Kaseya, just giving credence to the claim. The success of earlier supply chain attacks has also further motivated cybercrooks to devote even more time and resources to the practice, it was said. 

However it does seem that CEOs are taking notice of such threats, with the report adding 85% of CIOs were specifically instructed by chiefs to “improve the security of software build and distribution environments”. At the same time, 84% said the budget dedicated to the security of software development environments increased in the last 12 months. 

"Hackers have discovered that successful supply chain attacks, especially those that target machine identities, are extremely efficient and more profitable,” said Kevin Bocek, vice president of threat intelligence and business development for Venafi.

One of the reasons why supply chain attacks are so successful, Bocek believes, is because developers force innovation and speed, putting security in the back seat. “Unfortunately, security teams rarely have the knowledge or the resources to help developers solve these problems and CIOs are just waking up to these challenges,” he added.

To tackle these challenges, Venafi found, most CIOs (68%) are implementing additional security controls, while 57% are updating their review processes. Just above half (56%) are expanding their use of code signing, while 47% are looking at the provenance of their open-source libraries.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Closing the cybersecurity skills gap
The critical need for watertight security across the IT supply chain
Security
Removing software supply chain blind spots that put public sector organizations at risk
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Hardware supply chain threats can undermine your endpoint infrastructure
Representational image of a hacker
The 10 worst software disasters of 2024: cyberattacks, malicious AI, and silent threats
Holographic representation of cloud computing over open businessman's hand
Businesses are struggling to address vulnerabilities hidden in phantom dependencies
An abstract image of digital security.
Three tactics to creating a more secure supply chain
Latest in Security
Woman shocked by online scam, holding her credit card outside
Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
HTTPS in a browser address bar
Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Latest in News
Apple iPhone 16 Review
Three iPhone 17 model dummy units appear in a hands-on video leak
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
New Samsung Galaxy S25 Edge may have revealed some key details – including its price
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 9 (game #1140)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 9 (game #371)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 9 (game #637)
WhatsApp
WhatsApp just made its AI impossible to avoid – but at least you can turn it off