{"id":23598,"date":"2022-06-03T09:17:50","date_gmt":"2022-06-03T13:17:50","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=23598"},"modified":"2022-06-06T10:49:12","modified_gmt":"2022-06-06T14:49:12","slug":"execs-seeks-answer-to-growing-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/execs-seeks-answer-to-growing-supply-chain-attacks\/","title":{"rendered":"Execs Seeks Answer To Growing Supply Chain Attacks"},"content":{"rendered":"<p id=\"arIndex_1\" data-ar-index=\"1\">85% of CIOs were instructed by the Board of Directors or CEO to take actions to improve the security of software development and build environments.<\/p>\n<p id=\"arIndex_2\" data-ar-index=\"2\">80% of the 1,000 CIOs in a new survey report that their organizations are vulnerable to cyberattacks targeting software packages supply chains, so it is important to look for a lasting solution to solve the problem.<\/p>\n<p id=\"arIndex_3\" data-ar-index=\"3\">Several strategies were implemented to effectively address cyberattacks in the supply chain: 84% of respondents are increasing the budget to protect supply chain attacks, 68% of CIOs have introduced more security controls, 56% are using additional code signing and 47% are investigating the provenance of their open source libraries.<\/p>\n<p id=\"arIndex_4\" data-ar-index=\"4\">Implementing changes to better protect the supply chain is difficult for some organizations, because changing their safety practices and controls would require a fundamental change in structure.<\/p>\n<p id=\"arIndex_5\" data-ar-index=\"5\">Since not all companies can take the above security measures, analysts have presented code signing as the necessary response to stop supply chain attacks.<\/p>\n<p id=\"arIndex_6\" data-ar-index=\"6\">The use of code signing for the vulnerable systems allows companies to detect unsigned malware before it can wreak havoc on their supply chain and that of their customers.<\/p>\n<p id=\"arIndex_7\" data-ar-index=\"7\">The sources for this piece include an article in <a href=\"https:\/\/www.techrepublic.com\/article\/majority-of-cios-say-their-software-supply-chains-are-vulnerable-execs-demand-action\/\" target=\"_blank\" rel=\"noopener\">TechRepublic<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>85% of CIOs were instructed by the Board of Directors or CEO to take actions to improve the security of software development and build environments. 80% of the 1,000 CIOs in a new survey report that their organizations are vulnerable to cyberattacks targeting software packages supply chains, so it is important to look for a [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34,57,381],"tags":[],"class_list":["post-23598","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence","category-companies","category-operations"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=23598"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23598\/revisions"}],"predecessor-version":[{"id":23600,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23598\/revisions\/23600"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=23598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=23598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=23598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}