Don’t Trust, Just Verify: Why Your Software Supply Chain Needs a Sense of Humor

Secure by Demand is like asking your software supplier to wear a seatbelt. It’s a good start, but you’ll still want to check if the brakes work! Companies need more than just vendor questionnaires to ensure software safety—think independent testing to verify security. After all, trust is great, but verification is better.

Pro Dashboard

Hot Take:

Ah, the NotPetya attack, the infamous cyber event that taught us that trusting your software vendor is like trusting a cat not to knock things off the counter. With the US Cybersecurity and Infrastructure Security Agency (CISA) now urging enterprise buyers to demand more secure software, it seems like we’re finally putting the “cyber” back in “cybersecurity” and the “demand” back in… well, “demanding safer software.”

Key Points:

  • NotPetya was a significant cyberattack that cost the global economy $10 billion, affecting Maersk and others.
  • CISA’s Secure by Demand guidance empowers enterprises to insist on safer software from vendors.
  • Software assurance involves secure development, vulnerability tracking, and software transparency.
  • CISA’s approach relies on questionnaires and SBOMs, which might not provide full assurance.
  • Enterprise buyers need independent validation of software security to avoid blind trust.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?