Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

Cyber Tactics

Mission-critical supply chain software: A growing operational priority

By John McClurg
SEC0421-Cyber-Feat-Slide1-900px

gorodenkoff / iStock / Getty Images Plus via Getty Images

SEC0421-cyber-slide2_900px
SEC0421-Cyber-Feat-Slide1-900px
SEC0421-cyber-slide2_900px
April 1, 2021

Today, open-source code is everywhere. In fact, 99% of all codebases contain open-source code, and anywhere from 85% to 97% of enterprise codebases come from open-source. What does that mean, exactly? It means that the vast majority of our applications consist of code we did not write. So, the question isn’t if our applications run on open-source code, but rather how much? And on which applications, specifically?

The vulnerabilities in third-party or open-source dependencies have the potential to put any application of any organization at risk, but the threat and possible security impact for mission-critical software – within the software supply chain, specifically – is greater than what we may have thought.

Of all the issues coming from the SolarWinds exploit, this is perhaps the most important. Even though the breach in and of itself affected up to 18,000 clients – including Fortune 500 companies and multiple U.S. government agencies – it’s the method of attack which is arguably most dangerous. This was a supply chain attack. Instead of needing to exploit unpatched software vulnerabilities on their targets’ systems or trick individuals into downloading malicious software, the hackers simply relied on SolarWinds’ clients installing the software update at the company’s prompting.

Effectively, the hackers turned a run-of-the-mill software update into a highly sophisticated, dangerous weapon. Herein lies the crux of the threat, which, in turn, is forcing companies to entirely rethink their approach to protecting mission-critical supply chain software.

This starts and ends with being able to inspect all elements of an application’s code, ensuring the absence of malware or other cybersecurity threats. Software composition analysis tools can support organizations in building safe, secure software for their supply chain. These cloud-based AI tools scan all application code – especially open source – for any security vulnerabilities throughout the software.

What’s crucial to note is that mission-critical supply chain software permeates all aspects of everyday life, and the systems are often required to run 24 hours a day, 365 days a year without failure. From automotive solutions and industrial automation to medical devices and semiconductors, software is becoming more complex and frequently multi-tiered. With this great innovation, however, comes great vulnerability.

Take the ever-evolving world of connected and automated vehicles, for example. There’s no question that the automotive industry is undergoing major digital transformation. While the bulk of a car’s value was traditionally made up of its mechanical, hardware and other physical components, software and connected services are quickly becoming the most important drivers of value and key differentiators in the space.

Renovo, an automotive software company, was faced with a core development challenge of participating in safety-critical embedded systems while also retaining its identity as a dynamic, AI-driven solution. By utilizing mission-critical security solutions, the company was able to realize the necessary coherence between the AI pipeline and the safety-critical world.

So, at this point, one may reasonably ask, “what’s the connection between autonomous vehicles and IT security?” In short, both require some of the most complex software ever developed – specifically, supply chain software containing mission-critical applications that require the highest level of security.

Although in comparison to other attack vectors, supply chain compromises may seem few, they are certainly real, clear and present. They are highly targeted and carry an extremely high security risk, hence, making monitoring our supply chain environment and activity more important than ever. For example, Blackberry’s Jarvis software composition analysis tool was tested on the Department of Defense’s in-orbit satellite systems where it detected a backdoor in a piece of open-source code, which evaded all other tools tested in the process.

With most companies using open-source code to run large portions of their software applications, it’s clear that securing mission-critical supply chain software is a growing operation priority for companies and organizations across the spectrum. However, the critical question moving forward is – will those companies make the commitment to invest in the technology needed to provide adequate security?

KEYWORDS: cyber security information security risk management supply chain security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Locked vault

    Fortifying the software supply chain: A crucial security practice

    See More
  • supply chain - freepik

    Supply chain security is a higher priority than two years ago

    See More
  • Colorful wires twisted together

    91% of organizations faced a software supply chain attack last year

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing