Close Menu
West TimelinesWest Timelines
  • News
  • Politics
  • World
    • Africa
    • Asia
    • Australia
    • Europe
      • United Kingdom
      • Germany
      • France
      • Italy
      • Russia
      • Spain
      • Turkey
      • Ukraine
    • North America
      • United States
      • Canada
    • South America
  • Business
    • Finance
    • Markets
    • Investing
    • Small Business
    • Crypto
  • Elections
  • Entertainment
  • Health
  • Lifestyle
    • Fashion
    • Food & Drink
    • Travel
    • Astrology
  • Weird News
  • Science
  • Sports
    • Soccer
  • Technology
  • Viral Trends
Trending Now

Dubai Spotlight: Analyzing the Evolving Audience Tastes with AI Social Listening Tools in the UAE

3 weeks ago

مرآة التاريخ: تحليل البناء السردي للدروس الخالدة في قصص الأنبياء والإسلام

4 weeks ago

السندات الحكومية والشركات: أساسيات الاستثمار الآمن والدخل الثابت

1 month ago

UAE Ranks Among Top Rugby Markets on TOD as British & Irish Lions Tour Kicks Off

5 months ago

Darven: A New Leap in AI-Powered Legal Technology Launching from the UAE to the World

6 months ago
Facebook X (Twitter) Instagram
West TimelinesWest Timelines
  • News
  • US
  • #Elections
  • World
    • North America
      • United States
      • Canada
    • Europe
      • United Kingdom
      • Germany
      • France
      • Italy
      • Spain
      • Ukraine
      • Russia
      • Turkey
    • Asia
    • Australia
    • Africa
    • South America
  • Politics
  • Business
    • Finance
    • Investing
    • Markets
    • Small Business
    • Crypto
  • Lifestyle
    • Astrology
    • Fashion
    • Food & Drink
    • Travel
  • Health
  • Sports
    • Soccer
  • More
    • Entertainment
    • Technology
    • Science
    • Viral Trends
    • Weird News
Subscribe
  • Israel War
  • Ukraine War
  • United Kingdom
  • Canada
  • Germany
  • France
  • Italy
  • Russia
  • Spain
  • Turkey
  • Ukraine
West TimelinesWest Timelines
Home»Technology
Technology

Reducing Risks in Hardware and Software Infrastructure Supply Chains

April 19, 2024No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Telegram Email WhatsApp Copy Link

Yuriy Bulygin, the CEO and co-founder of Eclypsium, has highlighted the growing security threat that vulnerabilities within the hardware and software infrastructure supply chain pose to organizations worldwide. Even with proper precautions in place, a critical vulnerability in a trusted supplier’s infrastructure can provide attackers with an entry point to wreak havoc on a network. In response to this threat, security teams must take practical steps to ensure the integrity of their digital supply chain.

Six steps are outlined to help mitigate supply chain risks. Firstly, organizations should start by creating a bill of materials (BoM) for hardware, software, and firmware to have a comprehensive inventory of all underlying artifacts. Never trusting but always verifying the authenticity and integrity of critical hardware and software is crucial. Assessing and establishing vendor risk benchmarks, demanding proof of security measures, being proactive in monitoring for threats, and allocating budget to supply chain protection are also essential steps in mitigating risks.

The importance of prioritizing response to threats that can cause significant damage, such as infrastructure-based attacks that can disrupt critical equipment, is emphasized. Recent zero-day attacks on leading device manufacturers and disclosed vulnerabilities in organizations like Ivanti, Citrix, Juniper, and Fortinet highlight the urgency for addressing supply chain vulnerabilities. Security leaders must ensure that infrastructure-based attacks are prevented to safeguard against the potential bricking of equipment across the supply chain.

Security teams are advised to engage with vendors with a strong track record of minimal vulnerabilities and product security protocols, adopt agile internal processes, and select vendors and products based on security performance and commitment. Vendors should be required to provide evidence and artifacts to verify the integrity of their products, attest to the security of their upstream suppliers, and integrate third-party components securely. Proactive measures, such as monitoring for changes in component integrity, detecting threats, and allocating budget to supply chain protection, are crucial for safeguarding against supply chain attacks.

Despite the potential severity of supply chain vulnerabilities, a survey found that only 4.5% of IT security budgets are allocated to addressing these threats. The importance of investing more heavily in supply chain protection is emphasized, especially as 2024 is expected to see device manufacturers disclosing critical vulnerabilities in their products. Ensuring trust in complex and interconnected supply chains is essential for business continuity and national security. The availability of tools and technology to provide assurance in supply chain security highlights the need for businesses to take proactive steps in addressing these vulnerabilities.

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest Email Telegram WhatsApp Copy Link

You Might Like

Dubai Spotlight: Analyzing the Evolving Audience Tastes with AI Social Listening Tools in the UAE

Darven: A New Leap in AI-Powered Legal Technology Launching from the UAE to the World

Array

Array

Array

Array

Editors Picks

مرآة التاريخ: تحليل البناء السردي للدروس الخالدة في قصص الأنبياء والإسلام

4 weeks ago

السندات الحكومية والشركات: أساسيات الاستثمار الآمن والدخل الثابت

1 month ago

UAE Ranks Among Top Rugby Markets on TOD as British & Irish Lions Tour Kicks Off

5 months ago

Darven: A New Leap in AI-Powered Legal Technology Launching from the UAE to the World

6 months ago

Jordan to Host Iraq in the Final Round of the Asian World Cup Qualifiers After Securing Historic Spot

6 months ago

Latest News

فلسطين: قلبٌ ينبض بالصمود والأمل

7 months ago

Roland Garros 2025: A New Era of Viewing, A Tribute to Legends, and Moments to Remember

7 months ago

Array

7 months ago
Advertisement
Facebook X (Twitter) TikTok Instagram Threads
© 2025 West Timelines. All Rights Reserved. Developed By: Sawah Solutions
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.