Categories Cybersecurity

71% of CISOs hit with third-party security incident this year

Once a software development pipeline itself is compromised, every customer downstream inherits that risk.

The best defense is to get a clear picture of your entire software supply chain — its assets, tools, pathways, and controls — and then work to ensure the proper guardrails are in place, according to Joe Nicastro, field CTO at application security firm Legit Security.

“We still see build pipelines misconfigured, third-party code and packages flowing in without checks, and SBOMs treated as one-off documents instead of living inventories,” Nicastro tells CSO.

Written By

More From Author

You May Also Like