View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
In association with
  1. Technology
  2. Cybersecurity
March 23, 2022updated 20 Sep 2022 10:06am

Why enterprises must prepare for further rise in software supply chain attacks

Attacks on governments, enterprises and critical infrastructure are increasingly being instigated through embedding malicious code in trusted third-party software.

The IT and communication sector overtook financial services to become the most targeted industry by cybercriminals last year, according to research based on “early indicator analysis” by Darktrace.

At the heart of this rise has been an increased targeting of the software supply chain, as evidenced by a number of recent high-profile attacks, such as those on SolarWinds, Kaseya and GitLab. Attackers increasingly see such providers – and their proprietary source code, developer repositories, and open-source libraries – as an ideal entry point into target corporations, public bodies, and critical infrastructure.

Enterprises cannot suddenly turn away from utilising third-party vendors, so how can they best protect themselves against this significant and fast-growing threat? Tech Monitor editor-in-chief Pete Swabey spoke to Justin Fier, VP tactical risk and response at Darktrace, about the driving factors behind this rise; the lessons that have been learned from a spate of recent attacks; and why organisations of all sizes must urgently acquire greater visibility across their digital infrastructure, or risk catastrophe.   

Home page image by Themotioncloud/iStock

Topics in this article: ,
Websites in our network
NEWSLETTER Sign up Tick the boxes of the newsletters you would like to receive. Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
I consent to New Statesman Media Group collecting my details provided via this form in accordance with the Privacy Policy
SUBSCRIBED

THANK YOU