Don’t Trust, Just Verify: Why Your Software Supply Chain Needs a Sense of Humor
Secure by Demand is like asking your software supplier to wear a seatbelt. It’s a good start, but you’ll still want to check if the brakes work! Companies need more than just vendor questionnaires to ensure software safety—think independent testing to verify security. After all, trust is great, but verification is better.

Hot Take:
Ah, the NotPetya attack, the infamous cyber event that taught us that trusting your software vendor is like trusting a cat not to knock things off the counter. With the US Cybersecurity and Infrastructure Security Agency (CISA) now urging enterprise buyers to demand more secure software, it seems like we’re finally putting the “cyber” back in “cybersecurity” and the “demand” back in… well, “demanding safer software.”
Key Points:
- NotPetya was a significant cyberattack that cost the global economy $10 billion, affecting Maersk and others.
- CISA’s Secure by Demand guidance empowers enterprises to insist on safer software from vendors.
- Software assurance involves secure development, vulnerability tracking, and software transparency.
- CISA’s approach relies on questionnaires and SBOMs, which might not provide full assurance.
- Enterprise buyers need independent validation of software security to avoid blind trust.
Already a member? Log in here