{"id":30338,"date":"2022-10-26T10:52:32","date_gmt":"2022-10-26T14:52:32","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=509961"},"modified":"2022-10-27T10:20:11","modified_gmt":"2022-10-27T14:20:11","slug":"software-supply-chain-issues-worry-it-leaders-blackberry","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/software-supply-chain-issues-worry-it-leaders-blackberry\/","title":{"rendered":"Software supply chain issues worry IT leaders: BlackBerry"},"content":{"rendered":"<p data-ar-index=\"0\">Organizations are increasingly finding serious cyber security issues in their software supply chain, according to a recent survey by <a href=\"https:\/\/www.itworldcanada.com\/article\/blackberry-sells-legacy-patents-for-600-million\/472083\" rel=\"noopener\">BlackBerry<\/a>. Just over three-quarters of respondents said that in the last 12 months they had discovered unknown participants within their software supply chain.<\/p>\n<p data-ar-index=\"1\">Eighty per cent of IT decision-makers said their organization had received notification of\u00a0 an attack or vulnerability in their supply chain of software in the last 12 months, with the operating system and web browser creating the biggest impact.<\/p>\n<p data-ar-index=\"2\">Following a software supply chain attack, respondents reported significant operational disruption (59 per cent), data loss (58 per cent) and reputational impact (52 per cent), with nine out of ten organizations (90 per cent) taking up to a month to recover.<\/p>\n<p data-ar-index=\"3\">The survey of 1,500 IT decision-makers and cybersecurity leaders across Canada, the U.S., the United Kingdom, and Australia was released today, just before the start of the annual <a href=\"https:\/\/www.blackberry.com\/us\/en\/events\/2022\/blackberry-security-summit\" rel=\"noopener\">BlackBerry Security Summit.<\/a><\/p>\n<p data-ar-index=\"4\">The Summit begins this afternoon with a keynote speech by company chief executive officer John Chen, and continues Thursday with virtual sessions.<\/p>\n<p data-ar-index=\"5\">\u201cWhile most have confidence that their software supply chain partners have policies in place of at least comparable strength to their own, it is the lack of granular detail that exposes vulnerabilities for cybercriminals to exploit,\u201d commented Christine Gadsby, BlackBerry\u2019s vice-president of product security.<\/p>\n<p data-ar-index=\"6\">\u201cUnknown components and a lack of visibility on the software supply chain introduce blind spots containing potential vulnerabilities that can wreak havoc across not just one enterprise, but several, through loss of data and intellectual property and operational downtime, along with financial and reputational impact. How companies monitor and manage cybersecurity in their software supply chain has to rely on more than just trust.\u201d<\/p>\n<p data-ar-index=\"7\">BlackBerry also made a series of product announcements this morning.<\/p>\n<p data-ar-index=\"8\">\u2014<strong>Cyber Threat Intelligence<\/strong>, which will be delivered on a quarterly subscription basis, provides actionable intelligence on targeted attacks and cybercrime-motivated threat actors and campaigns. It will be tailored for industries, regions, and countries. It starts in December. No pricing was announced;<\/p>\n<p data-ar-index=\"9\">\u2014<strong>BlackBerry UEM<\/strong>, its unified endpoint management suite, adds new APIs that the company says significantly reduce administrative overhead. There\u2019s also stronger integration of all Google services from ChromeOS to Android, offering unified administration and an improved user experience. BlackBerry UEM will also offer greater eSIM integration;<\/p>\n<p data-ar-index=\"10\">\u2013coming improvements to CylanceProtect, CylanceOptics and CylanceGuard will give threat hunters a single-pane view of critical issues. There are also updates across triage and analysis workflows.<\/p>\n<p data-ar-index=\"11\">\u2014<strong>CylanceGateway<\/strong>, a zero-trust network access suite, will soon<span style=\"color: #000000;\"> provide data access and leakage visibility via a newly launched data loss detection module called CylanceAvert. Gateway will also add <\/span><span style=\"color: #000000;\">enhanced network anomaly detection to identify threats, broadened support for cloud workspaces and more granular access control.<\/span><\/p>\n<p data-ar-index=\"12\">BlackBerry said the Cylance portfolio improvements will be introduced later this year and early next year.<\/p>\n<p data-ar-index=\"13\">The post <a href=\"https:\/\/www.itworldcanada.com\/article\/software-supply-chain-issues-worry-it-leaders-blackberry\/509961\">Software supply chain issues worry IT leaders: BlackBerry<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>80 per cent of survey respondents said their organization had been notified of an software supply chain attack or vulnerability in the last<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[57,16,422],"tags":[76,699,393,700],"class_list":["post-30338","post","type-post","status-publish","format-standard","hentry","category-companies","category-security","category-supply-chain","tag-blackberry","tag-cylance","tag-security-strategies","tag-supply-chains"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/30338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=30338"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/30338\/revisions"}],"predecessor-version":[{"id":30385,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/30338\/revisions\/30385"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=30338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=30338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=30338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}