Event Recording

Chain of Confidence: Ensuring Trustworthiness in Software Supply Chains

Show description
Speaker
Paul Fisher
Lead Analyst
KuppingerCole
Paul Fisher
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry...
View profile
Top related content
Whitepaper
Secure Software Supply Chains
Jan 04, 2023
Major cyber-attacks such as the SolarWinds and Kaseya incidents demonstrate the need to focus significantly more on software supply chain security as well as traditional cyber defense areas. Avoiding the code tampering that occurred in both of those attacks by criminals and internal parties is essential. This whitepaper looks at how to increase security throughout the Software Development Lifecycle and implement a multi-layered, defense-in-depth code tampering prevention and detection strategy. Beyond Identity was founded in 2019 and offers identity and authentication solutions in...
Event Recording
Successfully tackling your Digital Supply Chain Risk
Nov 09, 2022
In this talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide insights on Digital Supply Chain Risk. He will look at the areas of risks, from secure partner onboarding to software supply chain security and others. He will look at prominent examples and common weaknesses in these areas. He then will provide insight into actions that organizations should and must take, both organizational and technical.  
Event Recording
Cybersecurity in the Software Supply Chain - The Adventure Is Just Beginning
Nov 11, 2021
My name is Nicholas. Thanks for inviting me. Thanks for everybody who is attending physical and well, a warm welcome to everybody who is online elsewhere. Thanks for watching and joining this session. So today Kok asked me to talk about cybersecurity and the software supply chain. And to be honest, this topic is quite interesting from a several perspective. So I have 20 minutes, let go, let's go on this journey. So towards myself, I'm a former hacker still associated to the Hagar community. I li...
Webinar Recording
DevOps Tools: Securing the Software Supply Chain
Jul 08, 2022
Following the SolarWinds and Kaseya supply chain attacks, security of the DevOps tools chain with all the related components has shifted to the center of attention. There is a lot to do around securing code and CI/CD tools, as well as the execution environments. But it all starts with protecting secrets such as keys, certificates, and even passwords - each one of these can provide access to large amounts of critical information. Join experts from KuppingerCole Analysts and Keeper Security as they discuss the expanding attack surface in the DevOps environment. This is often due to...
Event Recording
The SolarWinds Hack and the Executive Order on Cybersecurity Happened - It Is Time to Prepare
May 12, 2022
Again and again, I am asked how one can start with the topic of security in an agile project environment. What are the essential first steps, and what should you focus on at the beginning? Of course, this raises the question of suitable methodologies and tools. At the same time, the strategic orientation of the company must be included in this security strategy. We have also learned in the recent past that attacks like the “Solarwinds Hack” are becoming more and more sophisticated and that the attackers now focus on the entire value chain. What tools are there, and where should...
Whitepaper
Software Supply Chain Security: Don’t Get Your Code Tampered
Jan 18, 2022
Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external attackers and internal parties is essential. This whitepaper looks at how to increase security throughout the Software Lifecycle and implement a multi-layered, defense-in-depth code tampering prevention and detection strategy.
Webinar Recording
Protecting the Business From Software Supply Chain Threats
Apr 08, 2022
Recent events such as the SolarWinds and Kaseya compromises by malicious actors have demonstrated the need to focus significantly more on software supply chain security. According to a report from ENISA, supply chain attacks are increasing, with 66% of attacks focusing on source code and 62% exploiting customer trust in suppliers. This is a risk organizations can’t afford to ignore.
Blog
The Next Level of Zero Trust: Software Security and Cyber Supply Chain Risk Management
Feb 10, 2021
The recent SolarWinds incident has shed a light on an area of cybersecurity that is not frequently in focus. Better said, it is “again has shed a light”, if we remember the Heartbleed incident that happened back in 2014. Back then, my colleague Alexei Balaganski wrote in a blog post that “software developers (both commercial and OSS) […] should not rely blindly on third-party libraries, but treat them as a part of critical infrastructure”. What we need is a define...
Analyst Chat
Analyst Chat #64: Applying The Zero Trust Principle To The Software Supply Chain
Feb 22, 2021
Martin Kuppinger is one of the founders and the principal analyst of KuppingerCole and he is steering the overall development of the topics covered in KC's research, events and advisory. He joins Matthias to talk about the importance of extending Zero Trust to cover software security, for software in any form (embedded, COTS, as-a-service) and regardless of whether it’s home-grown or externally procured.