{"id":19382,"date":"2022-06-19T23:10:05","date_gmt":"2022-06-20T07:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/19\/news-13115\/"},"modified":"2022-06-19T23:10:05","modified_gmt":"2022-06-20T07:10:05","slug":"news-13115","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/19\/news-13115\/","title":{"rendered":"Securing the software supply chain, with Kim Lewandowski: Lock and Code S03E13"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 20 Jun 2022 06:11:56 +0000<\/strong><\/p>\n<p>At the start of the global coronavirus pandemic, nearly everyone was forced to learn about the &#8220;supply chain.&#8221; Immediate stockpiling by an alarmed (and from a smaller share, opportunistic) public led to an almost overnight disappearance of hand sanitizer, bottled water, toilet paper, and face masks.<\/p>\n<p>In time, those items returned to stores. But then a big ship got stuck in the Suez, and once again, we learned even more about the vulnerability of supply chains. They can handle little stress. They can be derailed with one major accident. They spread farther than we know. <\/p>\n<p>While the calamity in the canal involved many lessons, there was another story in late 2020 that required careful study in cyberspace\u2014an attack on the digital supply chain. <\/p>\n<p>That year, attackers breached a network management tool called Orion, which is developed by the Texas-based company SolarWinds. Months before the attack was caught, the attackers swapped malicious code into a legitimately produced security update from SolarWinds. This malicious code gave the attackers a backdoor into every Orion customer who both downloaded and deployed the update and who had their servers connected online. Though the initial number of customers who downloaded the update was about 18,000 companies, the number of customers infected with the attackers\u2019 malware was far lower, somewhere around 100 companies and about a dozen government agencies.<\/p>\n<p>This attack, which did involve a breach of a company, had a broader focus\u2014the many, many clients of that one company. This was an attack on the software supply chain, and since that major event, similar attacks have happened again and again. <\/p>\n<p>Today, on the Lock and Code podcast with host David Ruiz, we speak with Kim Lewandowski, founder and head of product at Chainguard, about the software supply chain, its vulnerabilities, and how we can fix it.<\/p>\n<figure class=\"wp-block-pullquote\">\n<blockquote>\n<p>&#8220;Our software supply chains are as brittle and sort of filled with weaknesses, similar to a physical supply chain. When you think about every step of the path from when a developer starts writing software all the way to where it\u2019s pushed to production, or where end user is using it, there\u2019s different attack vectors across that entire path.&#8221;<\/p>\n<p><cite>Kim Lewandowski, founder, head of product, Chainguard Inc. <\/cite><\/p><\/blockquote>\n<\/figure>\n<p>Tune in to hear about why the software supply chain is so difficult to secure, what is at stake if we continue to ignore the problem, and what steps we can take today\u2014and tomorrow\u2014to ensure that future software builds are secure and trustworthy. <\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-spotify wp-block-embed-spotify wp-embed-aspect-21-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper\"> <iframe title=\"Spotify Embed: Securing the software supply chain, with Kim Lewandowski\" style=\"\" width=\"100%\" height=\"420\" frameborder=\"0\" allowfullscreen allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\"><\/iframe>         <\/p>\n<div class=\"col-md-8 embedded-video-alt\">\n<div class=\"embedded-video-alt-inner\">\n<div class=\"embedded-video-alt-text\">                   This video cannot be displayed because your <i>Functional Cookies<\/i> are currently disabled.<\/p>\n<p>                        To enable them, please visit our <i><a href=\"https:\/\/www.malwarebytes.com\/privacy\/#how-we-collect-information\">privacy policy<\/a><\/i> and search for the Cookies section. Select <i>&#8220;Click Here&#8221;<\/i> to open the Privacy Preference Center and select <i>&#8220;Functional Cookies&#8221;<\/i> in the menu. You can switch the tab back to <i>&#8220;Active&#8221;<\/i> or disable by moving the tab to <i>&#8220;Inactive.&#8221;<\/i> Click <i>&#8220;Save Settings.&#8221;<\/i>             <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/figure>\n<p>You can find us on\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/lock-and-code\/id1500049667\" target=\"_blank\" rel=\"noreferrer noopener\">Apple Podcasts<\/a>,\u00a0<a href=\"https:\/\/open.spotify.com\/show\/3VB1MCXNk76TSddNNZcDuo?si=b454MPzCTYWvvS5bOPdxcA\" target=\"_blank\" rel=\"noreferrer noopener\">Spotify<\/a>, and\u00a0<a href=\"https:\/\/podcasts.google.com\/feed\/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2xvY2thbmRjb2RlL2ZlZWQueG1s\" target=\"_blank\" rel=\"noreferrer noopener\">Google Podcasts<\/a>, plus whatever preferred podcast platform you use.<\/p>\n<h4><strong>Show notes, resources, and credits<\/strong><em>:<\/em><\/h4>\n<p>Kubernetes diagram: <\/p>\n<p><a href=\"https:\/\/user-images.githubusercontent.com\/622577\/170547400-ef9e2ef8-e35b-46df-adee-057cbce847d1.svg\">https:\/\/user-images.githubusercontent.com\/622577\/170547400-ef9e2ef8-e35b-46df-adee-057cbce847d1.svg<\/a><\/p>\n<p>Intro Music: \u201cSpellbound\u201d by Kevin MacLeod (incompetech.com)<br \/>Licensed under Creative Commons: By Attribution 4.0 License<br \/><a href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\">http:\/\/creativecommons.org\/licenses\/by\/4.0\/<\/a><br \/>Outro Music: \u201cGood God\u201d by Wowa (unminus.com)<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/podcast\/2022\/06\/securing-the-software-supply-chain-with-kim-lewandowski-lock-and-code-s03e13\/\">Securing the software supply chain, with Kim Lewandowski: Lock and Code S03E13<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/podcast\/2022\/06\/securing-the-software-supply-chain-with-kim-lewandowski-lock-and-code-s03e13\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 20 Jun 2022 06:11:56 +0000<\/strong><\/p>\n<p>This week on Lock and Code, we speak with Kim Lewandowski about what steps we can take to secure the software supply chain. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/podcast\/2022\/06\/securing-the-software-supply-chain-with-kim-lewandowski-lock-and-code-s03e13\/\">Securing the software supply chain, with Kim Lewandowski: Lock and Code S03E13<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26618,25810,26619,18681,5820,12172,26620,26621,17237],"class_list":["post-19382","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-chainguard","tag-kaseya-vsa","tag-kim-lewandowski","tag-kubernetes","tag-podcast","tag-software-supply-chain","tag-solarwinds","tag-solarwinds-orion","tag-supply-chain"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19382"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19382\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19382"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}