{"id":55119,"date":"2024-07-08T14:00:00","date_gmt":"2024-07-08T18:00:00","guid":{"rendered":"https:\/\/sdtimes.com\/?p=55119"},"modified":"2024-07-10T15:07:33","modified_gmt":"2024-07-10T19:07:33","slug":"companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/","title":{"rendered":"Companies still need to work on security fundamentals to win in the supply chain security fight"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Though this is technically a \u201c<\/span><a href=\"https:\/\/sdtimes.com\/category\/buyers-guide\/\"><span style=\"font-weight: 400;\">Buyer&#8217;s Guide<\/span><\/a><span style=\"font-weight: 400;\">\u201d by SD Times terminology, let\u2019s preface this article by remembering that buying a piece of software isn\u2019t the key to fixing all security issues. If there was some magical security solution that could be installed to instantly fix all security problems, we wouldn\u2019t be seeing a year-over-year increase in supply chain attacks, and you probably wouldn\u2019t be reading this article.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yes, tooling is important; You can\u2019t secure the software supply chain with secure coding practices alone. But you\u2019ll need to combine those best practices with things like software bills of materials (SBOMs), software composition analysis, exploit prediction scoring systems (EPSS), and more.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before we can begin to think about what tooling can help, step one in this fight is to get the fundamentals down, explained Rob Cuddy, global application security evangelist at <\/span><a href=\"https:\/\/www.hcl-software.com\/\"><span style=\"font-weight: 400;\">HCLSoftware<\/span><\/a><span style=\"font-weight: 400;\">. \u201cThere&#8217;s a lot of places now that are wanting to do security better, but they want to jump to steps four, five, and six, and they forget about steps one, two, and three,\u201d he said.\u00a0<\/span><\/p>\n<p><strong>See also: <a href=\"https:\/\/sdtimes.com\/security\/a-guide-to-supply-chain-security-tools\/\">A guide to supply chain security tools<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">He explained that even with new types of threats and vulnerabilities that are emerging, it\u2019s still important to take a step back and make sure your security foundation is strong before you start getting into advanced tooling.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cHaving the basics done really, really well gets you a long way towards being safe in that space,\u201d he said.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Janet Worthington, senior analyst at <\/span><a href=\"https:\/\/www.forrester.com\/bold\"><span style=\"font-weight: 400;\">Forrester<\/span><\/a><span style=\"font-weight: 400;\">, the first step is to ask if you\u2019re following secure development practices when actually writing software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cAre we secure by design when we&#8217;re building these applications? Are we doing threat modeling? Are we thinking about where this is going to be installed? About how people are going to use it? What are some of the attack vectors that we have to worry about?\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These are some of the basics that companies need to get down before they even start looking at where tooling can help. But of course, tooling does still play a crucial role in the fight, once those pieces are in place, and Cuddy believes it is crucial that any tool you use supports the fundamentals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The bare minimum for software supply chain security is to have an SBOM, which is a list of all of the components in an application. But an SBOM is just an ingredient list, and doesn\u2019t provide information about those ingredients or where they came from, Worthington explained.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kristofer Duer, software architect team lead at HCLSoftware, added, \u201cyou need to know what goes into it, but you also need to know where it&#8217;s built and who has access to the code and a whole list of things.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Worthington, this is where things like software composition analysis tools come in, which can analyze SBOMs for security risks, license compliance issues, and the operational risk of using a component.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cAn example of an operational risk would be this component is only maintained by one person, and that single contributor might just abandon the software or they might go do something else and no longer be maintaining that application,\u201d she said.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Colin Bell, AppScan CTO at HCLSoftware, EPSS \u2014 a measure of the likelihood that a vulnerability actually gets exploited \u2014 is another emerging tool to improve supply chain security by smartly prioritizing remediation efforts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cJust because you have something in your supply chain doesn&#8217;t necessarily mean that it&#8217;s being used,\u201d he explained.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bell said that he believes a lot of organizations struggle with the fact that they perceive every vulnerability to be a risk. But in reality, some vulnerabilities might never be exploited and he thinks companies are starting to recognize that, especially some of the larger ones.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By focusing first on fixing the vulnerabilities that are most at risk of getting exploited, developers and security teams can effectively prioritize their remediation strategy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Worthington added that integrating secure by design foundations with some of these tools can also cut down on release delays that are caused by scanning tools finding security issues at the last moment, right before deployment, which might prevent deployments from going out until the issues are resolved. This is needed as companies are under more and more pressure to release software faster than ever.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cOrganizations that release frequently with high confidence do so by embedding security early in the Software Development Life Cycle (SDLC),\u201d said Worthington. \u201cAutomating security testing, such as Software Composition Analysis and Static Application Security Testing, provides feedback to developers while they are writing code in the IDE or when they receive code review comments on a pull request. This approach gives developers the opportunity to review and respond to security findings in the flow of work.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">She also said that identifying issues before they are added to the codebase can actually save time in the long run by preventing things from needing to be reworked. \u201cSecurity testing tools that automate the remediation process improve product velocity by allowing developers to focus on writing business logic without having to become security experts,\u201d she said.\u00a0<\/span><\/p>\n<h5><b>XZ Utils backdoor highlights importance of people in protecting the software supply chain<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">However, as mentioned at the top, tools are only one component in the fight, and secure practices are also needed to deal with more advanced threats. A recent example of where the above-mentioned tools wouldn\u2019t have done much to help on their own is when in March, it was announced that a backdoor had been introduced into the open-source Linux tool <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/XZ_Utils_backdoor\"><span style=\"font-weight: 400;\">XZ Utils<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The person who had placed the backdoor had been contributing to the project for three years while gaining the trust of the maintainers and ultimately was able to rise to a level at which they could sign off on releases and introduce the backdoor in an official release. If it hadn\u2019t been detected when it was and had been adopted by more people, attackers could have gained access to SSH sessions around the world and really caused some damage.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Duer, the vulnerability didn\u2019t even show up in code changes because the attacker put the backdoor in a .gitignore file. \u201cWhen you downloaded the source to do a build locally, that&#8217;s when the attack actually got realized,\u201d he said.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He went on to explain that this goes to show that developers can no longer just \u201cget the source and run a build and call it a day. You have to do so much more than that \u2026 They have the SHA-256 hash mark on the bins, but how many people run those commands to see if the thing that they downloaded is that hash? Does anybody look in the CVE for this particular package to see if there&#8217;s a problem? Where do you rely on scanners to do that work for you? It&#8217;s interesting because a lot of the problems could be avoided with another couple of extra steps. It doesn&#8217;t even take that much time. You just have to do them,\u201d Duer said.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Worthington added that it\u2019s really important that the people actually pulling components into their applications are able to assess quality before bringing something into their system or application. Is this something maintained by the Linux Foundation with a vibrant community behind it or is it a simple piece of code where nobody is maintaining it and it might reach end of life?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cA very sophisticated attacker played the long game with a maintainer and basically wore that poor maintainer down through social engineering to get their updates into XZ Utils. I think we&#8217;re finding that you need to have a really robust community. And so I think SBOM is only going to get you so far,\u201d said Worthington.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While this may seem like an extreme example, the Open Source Security Foundation (OpenSSF) and the OpenJS Foundation put out an <\/span><a href=\"https:\/\/openssf.org\/blog\/2024\/04\/15\/open-source-security-openssf-and-openjs-foundations-issue-alert-for-social-engineering-takeovers-of-open-source-projects\/\"><span style=\"font-weight: 400;\">alert<\/span><\/a><span style=\"font-weight: 400;\"> following the incident and implied that it might not be an isolated incident, citing similar suspicious patterns in two other popular JavaScript projects.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the post, they gave tips for recognizing social engineering attacks in open source projects, such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aggressive, but friendly, pursuit of maintainers by unknown community members<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Requests from new community members to be elevated to maintainer status<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Endorsement of new community members coming from other unknown members<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PRs containing blobs as artifacts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Intentionally difficult to understand source code<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Gradually escalating security issues<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Deviation from typical project compile, build, and deployment practices<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A false sense of urgency to get a maintainer to bypass reviews or controls<\/span><\/li>\n<\/ul>\n<h5><b>AI will make things worse and better<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">AI will also exacerbate the number of threats that people have to deal with because as much as AI can add useful features to security tools to help security teams be more effective, AI also helps the attackers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having AI in applications complicates the software supply chain, Worthington explained. \u201cThere&#8217;s a whole ecosystem around it,\u201d she said. \u201cWhat about all the APIs that are calling the LLMs? Now you have to worry about API security. And there&#8217;s gonna be a bunch of new types of development tools in order to build these applications and in order to deploy these applications.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Worthington says that attackers are going to recognize that this is an area that people haven\u2019t really wrapped their heads around in terms of how to secure it, and they\u2019re going to exploit that, and that\u2019s what worries her most about the advances in AI as it relates to supply chain security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, it\u2019s not all bad; in many ways, supply chain security can benefit from AI assistance. For instance, there are now software composition analysis tools that are using generative AI to explain vulnerabilities to developers and offer recommendations on how to fix it, Worthington explained.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cI think AI will help the attackers but I think the first wave is actually helping defenders at this point,\u201d she said.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bell was in agreement, adding \u201cif you&#8217;re defending, it&#8217;s going to improve the threat detection, it&#8217;s going to help with incident response, and it\u2019s going to help with detecting whether vulnerabilities are real.\u201d<\/span><\/p>\n<h5><b>The government is starting to play a role in securing supply chains<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">In 2021, President Biden signed an <\/span><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/05\/12\/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks\/\"><span style=\"font-weight: 400;\">executive order<\/span><\/a><span style=\"font-weight: 400;\"> addressing the need to have stronger software supply chain security in government. In it, Biden explained that bold change is needed over incremental improvements, and stated that this would be a top priority for the administration.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The executive order requires that any company selling software to the government provide an SBOM and set up a pilot program to create an \u201cenergy star\u201d type program for software so that the government can easily see if software was developed securely.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cToo much of our software, including critical software, is shipped with significant vulnerabilities that our adversaries exploit,\u201d the White House <\/span><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/05\/12\/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks\/\"><span style=\"font-weight: 400;\">explained<\/span><\/a><span style=\"font-weight: 400;\">. \u201cThis is a long-standing, well-known problem, but for too long we have kicked the can down the road. We need to use the purchasing power of the Federal Government to drive the market to build security into all software from the ground up.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Worthington said: \u201cI think the Biden administration has done a really good job of trying to help software suppliers understand sort of like what the minimum requirements they&#8217;re going to be held to are, and I think those are probably the best place to start.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cuddy agreed and added that the industry is starting to catch up to the requirements. \u201cNot only do you need to generate a bill of materials, but you have to be able to validate across it, you have to prove that you&#8217;ve been testing against it, that you&#8217;ve authorized those components \u2026 So much of it started with the executive order that was issued a few years ago from President Biden, and you&#8217;ve now seen the commercial side starting to catch up with some of those things, and really demanding it more,\u201d he said.<\/span><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Though this is technically a \u201cBuyer&#8217;s Guide\u201d by SD Times terminology, let\u2019s preface this article by remembering that buying a piece of software isn\u2019t the key to fixing all security issues. If there was some magical security solution that could be installed to instantly fix all security problems, we wouldn\u2019t be seeing a year-over-year increase  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":752,"featured_media":55143,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[2398,15303,1],"tags":[841,17013,45,16505],"coauthors":[11687],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Companies still need to work on security fundamentals to win in the supply chain security fight - SD Times<\/title>\n<meta name=\"description\" content=\"Secure coding practices need to be implemented first before seeking out software supply chain tools like SBOMs, software composition analysis, EPSS, etc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Companies still need to work on security fundamentals to win in the supply chain security fight - SD Times\" \/>\n<meta property=\"og:description\" content=\"Secure coding practices need to be implemented first before seeking out software supply chain tools like SBOMs, software composition analysis, EPSS, etc.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-08T18:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T19:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"261\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Barron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Barron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/\"},\"author\":{\"name\":\"Jenna Barron\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\"},\"headline\":\"Companies still need to work on security fundamentals to win in the supply chain security fight\",\"datePublished\":\"2024-07-08T18:00:00+00:00\",\"dateModified\":\"2024-07-10T19:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/\"},\"wordCount\":2008,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png\",\"keywords\":[\"Forrester\",\"HCLSoftware\",\"security\",\"software supply chain\"],\"articleSection\":[\"Buyers Guide\",\"Featured\",\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/\",\"url\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/\",\"name\":\"Companies still need to work on security fundamentals to win in the supply chain security fight - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png\",\"datePublished\":\"2024-07-08T18:00:00+00:00\",\"dateModified\":\"2024-07-10T19:07:33+00:00\",\"description\":\"Secure coding practices need to be implemented first before seeking out software supply chain tools like SBOMs, software composition analysis, EPSS, etc.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png\",\"width\":200,\"height\":261},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Companies still need to work on security fundamentals to win in the supply chain security fight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\",\"name\":\"Jenna Barron\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"caption\":\"Jenna Barron\"},\"description\":\"Jenna Barron is News Editor of SD Times.\",\"url\":\"https:\/\/sdtimes.com\/author\/jennifer-sargent\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Companies still need to work on security fundamentals to win in the supply chain security fight - SD Times","description":"Secure coding practices need to be implemented first before seeking out software supply chain tools like SBOMs, software composition analysis, EPSS, etc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/","og_locale":"en_US","og_type":"article","og_title":"Companies still need to work on security fundamentals to win in the supply chain security fight - SD Times","og_description":"Secure coding practices need to be implemented first before seeking out software supply chain tools like SBOMs, software composition analysis, EPSS, etc.","og_url":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2024-07-08T18:00:00+00:00","article_modified_time":"2024-07-10T19:07:33+00:00","og_image":[{"width":200,"height":261,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png","type":"image\/png"}],"author":"Jenna Barron","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Jenna Barron","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/"},"author":{"name":"Jenna Barron","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786"},"headline":"Companies still need to work on security fundamentals to win in the supply chain security fight","datePublished":"2024-07-08T18:00:00+00:00","dateModified":"2024-07-10T19:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/"},"wordCount":2008,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png","keywords":["Forrester","HCLSoftware","security","software supply chain"],"articleSection":["Buyers Guide","Featured","Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/","url":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/","name":"Companies still need to work on security fundamentals to win in the supply chain security fight - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png","datePublished":"2024-07-08T18:00:00+00:00","dateModified":"2024-07-10T19:07:33+00:00","description":"Secure coding practices need to be implemented first before seeking out software supply chain tools like SBOMs, software composition analysis, EPSS, etc.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/07\/Copy-of-Copy-of-Generative-AILow-Code-Buyers-Guide-2.png","width":200,"height":261},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/security\/companies-still-need-to-work-on-security-fundamentals-to-win-in-the-supply-chain-security-fight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"Companies still need to work on security fundamentals to win in the supply chain security fight"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786","name":"Jenna Barron","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e","url":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","caption":"Jenna Barron"},"description":"Jenna Barron is News Editor of SD Times.","url":"https:\/\/sdtimes.com\/author\/jennifer-sargent\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/55119"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/752"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=55119"}],"version-history":[{"count":6,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/55119\/revisions"}],"predecessor-version":[{"id":55154,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/55119\/revisions\/55154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/55143"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=55119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=55119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=55119"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=55119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}