cxo voice
  • Business
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Business
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

Supply Chain Attacks – The Open Source Effect

Harish Kumar by Harish Kumar
January 3, 2023
A A
Supply Chain Attacks – The Open Source Effect

Image Credit: Pixabay

The accelerated digital transformation over the past few years and the pressing demand for remotely administered, agile, and scalable networks have accelerated moves to the cloud, which allows flexibility in scale and resource management while enabling accessibility from anywhere. The vibrant nature of cloud-based infrastructure breaks traditional network boundaries but presents various new challenges, making traditional security systems inefficient. While cloud infrastructure continues to be adopted by more organizations, businesses are not the only ones who have recognized the potential of the cloud. In recent years, there has been an unprecedented rise in the scale and sophistication of software supply chain attacks. From the SolarWinds software supply-chain attack to the exposed Apache Log4j vulnerability, threat actors have trained their sights on this space, targeting critical vulnerabilities in both cloud providers and supply chains. 

Cloud computing in itself has seen multiple vulnerabilities in recent times – and as organizations continue to adopt the cloud, with 35% running more than 50% of their workloads on the likes of Azure, AWS, and GCP, they struggle to manage the complexity of securing their cloud infrastructures across multiple cloud platforms, while also suffering a cyber-skills and knowledge shortage according to the Check Point 2022 Cloud Security Report. 

The global report, based on a survey of 775 cyber security professionals, also revealed that cloud security incidents were up 10% from the previous year, with 27% of organizations now citing misconfiguration, way ahead of issues like exposed data or account compromise. 

Here in India, according to the Check Point Threat Intelligence Report, an organization in India is being attacked on average 1798 times per week in the last 6 months, compared to 1126 attacks per organization globally, a worrying trend of increased cyberattacks. 

The evolution of this, it seems, has seen cybercriminals take supply chain attacks to the cloud arena. We saw evidence of this in March when the notorious ransomware gang Lapsus$ released a statement claiming to have gained access to Okta, an identity management platform, by obtaining access to an administrative account. Okta is a cloud-based software used by thousands of companies to manage and secure user authentication processes. Developers also use it to build identity controls. This means that hundreds of thousands of users worldwide could have been compromised by the Lapsus$ attack.

Exactly how many, however, is open to discussion. The hackers themselves claimed to have gained access to 95% of Okta’s clients, while Okta suggested just 2.5% of user details were compromised. Either way, the incident should be a warning sign for the potential risks posed by supply chain attacks.

ADVERTISEMENT

What puts a supply chain at risk? 

The industry has seen increasing cyber attacks that leverage weak supply chain methodologies. Currently, the most prominent supply chain risk that organizations are exposed to comes from open-source software. This is because the open-source community provides many modules and packages regularly adopted by businesses worldwide, including those within your supply chain.

The problem with open-source, however, is that it is inherently insecure. That is partly because it is written by individuals who may lack the expertise or budget to make them completely safe. The other issue with open-source code comes down to ownership. After all, once a package is released to the community, it is impossible to determine who owns it and who is responsible for maintaining it.

This creates a chink in your security architecture because the open-source packages that you import may have dependencies that you are simply not aware of. That is exactly what happened with NotPetya: an evolution of a pretty standard string of malware, NotPetya managed to infiltrate systems across the globe by relying on a piece of widely used open-source accounting software. This meant that it spread like wildfire, causing chaos in Ukraine and several major countries, including the U.K., France, Germany, Russia, and the U.S.

The ubiquity of open-source software and code means that it can be hard for organizations to know if either they or their suppliers are vulnerable to such attacks. It makes the supply chain an attractive target for cybercriminals who will invest time and resources into these attacks on the understanding that by breaching one system, they can quickly access many more.

How can you prevent potential attacks?

So far, in 2022, we have seen a seismic shift in the cloud threat landscape as more and more threat actors target critical vulnerabilities in both cloud providers and supply chains. What does this mean for your business, and how can you avoid this growing threat?

Unfortunately, when it comes to your cloud provider, no matter who you choose, their platform will have vulnerabilities. You could conduct all the research in the world and call on the know-how of the industry’s best experts, but you cannot control the security of your chosen provider’s platform.

So, if we cannot prevent a breach within cloud providers themselves, what can organizations do to protect themselves? We help provide some salient steps to take : 

Multi-Layered Security: The answer lies in creating multiple overlapping layers of security that help to reduce your exposure to risk. Organizations tend to build security mitigations as a single protection-control point, and attackers will try to evade such. Security implementation that assumes the first tier may fail and enforces multiple layers will have a greater chance of surviving a sophisticated cyber attack. This means that even if a vulnerability in your cloud provider were to be exploited, you have a robust enough security ecosystem to ward off attacks and mitigate any potential fallout.

Adopting a zero-trust security mindset: A starting point to help organizations protect themselves is to adopt a zero-trust security mindset. That way, even if there is a breach, your business data is protected, containing any threat posed by a cloud-based attack and ensuring that it cannot spread within your own systems

Automate DevSecOps: Automation in the cloud is key – it is important to ensure the ease of use and support for automation at every stage of the security and development process. The earlier organizations enable security in the development cycle, the more they can reduce the risk and cost of mistakes. Another way businesses can ensure the virtual doors to their network remain firmly locked is to automate their DevSecOps, ensuring that security operations can be deployed in real-time and fully aligned with other business objectives. For example, Check Point CloudGuard includes automated security tools for developers in order to ensure that all code is secured from the outset before being deployed. It scans infrastructure-as-code and source code to eliminate threats at the earliest phase.

With the sheer velocity of malware and ransomware variants, the widespread growth of enterprise-connected and personal devices, and the hybrid work model, it is nearly impossible for traditional human-created models to provide holistic and up-to-date security that would detect threats such as the Apache Log4j vulnerability exploit and supply chain attacks. 

Also Read: Top Technology Trends to Watch in 2023

Harish Kumar

Harish Kumar

Head, Enterprise at Check Point Software Technologies, India & SAARC

Related Posts

Rajkumar Bafna Delhi Pollution
People

Akums Pharma’s Finance Chief Rajkumar Bafna Resigns Citing Pollution in Delhi

December 29, 2025
Coforge Encora
Business

Coforge to Acquire Encora in $2.35 Billion Deal, Creating Global AI Engineering Powerhouse

December 26, 2025
MediaTek and DENSO
Automotive

MediaTek and DENSO Forge Strategic Alliance to Drive Next-Gen Automotive ADAS Solutions

December 26, 2025
Deloitte India and Google Cloud
Business

Deloitte India Expands Partnership with Google Cloud to Deliver Next-Gen AI-Powered Security Solutions

December 25, 2025
NetApp and Agastya
Business

NetApp and Agastya Launch Data Explorers Lab to Advance Data & AI Education in India

December 24, 2025
Noida International Airport
Business

Noida International Airport Taps Tech Mahindra to Bolster Cybersecurity and Network Operations

December 23, 2025
Cybersecurity predictions 2026
Opinion

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

December 23, 2025
Home Routers
Cyber Security

The Home Router Crisis of 2026: How India’s Living Rooms Became the New Cyberwar Frontline

December 23, 2025
Load More
ADVERTISEMENT

Latest Updates

Rajkumar Bafna Delhi Pollution

Akums Pharma’s Finance Chief Rajkumar Bafna Resigns Citing Pollution in Delhi

by CXOVoice Edtiroial Team
5 hours ago

Coforge Encora

Coforge to Acquire Encora in $2.35 Billion Deal, Creating Global AI Engineering Powerhouse

by Deepa Sharma
3 days ago

MediaTek and DENSO

MediaTek and DENSO Forge Strategic Alliance to Drive Next-Gen Automotive ADAS Solutions

by CXOVoice Edtiroial Team
3 days ago

Deloitte India and Google Cloud

Deloitte India Expands Partnership with Google Cloud to Deliver Next-Gen AI-Powered Security Solutions

by News Desk
4 days ago

NetApp and Agastya

NetApp and Agastya Launch Data Explorers Lab to Advance Data & AI Education in India

by Deepa Sharma
5 days ago

Noida International Airport

Noida International Airport Taps Tech Mahindra to Bolster Cybersecurity and Network Operations

by Deepa Sharma
6 days ago

Expert Views

Cybersecurity predictions 2026
Opinion

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

December 23, 2025
Home Routers
Cyber Security

The Home Router Crisis of 2026: How India’s Living Rooms Became the New Cyberwar Frontline

December 23, 2025
Storage Engineers
Opinion

5 Future-Ready Skills Every Storage Engineer Should Build in 2026

December 22, 2025
AI Govern
AI

How CIOs and CISOs Can Govern AI Without Slowing the Business

December 22, 2025
Technology trends 2026
Opinion

Technology trends redefining how enterprises will operate in 2026

December 19, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

NewgenONE
Interview

Reimagining Enterprise Transformation: Varun Goswami on the Future of NewgenONE and AI-Driven Automation

-
Jagat Shah, Chairman & CEO of MITSUMI Group
Leaders Talk

Leadership in Emerging Markets: Exclusive Interview with Jagat Shah, Chairman & CEO of MITSUMI Distribution

-
Tokenization
Interview

Revolutionizing Finance: An Exclusive Interview with Sid Ugrankar, Co-founder of Qila.io on the Future of Blockchain and Tokenization

-
Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-

Entrepreneur

Persistent Gender Bias Clouds Perceptions of Leadership in Tech: Study Finds

Top Leadership Skills Entrepreneurs Need in the Age of AI

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. We publish informed analysis, news reporting, expert commentary, and expert insights across enterprise technology, digital transformation, cybersecurity, data, AI, sustainability, and governance.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads
Loading
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Editorial Policy
  • Feedback

Copyright © 2025 de Audience - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • News
  • Business
  • Technology
  • Cyber Security
  • Opinion
  • Leaders Talk

Copyright © 2025 de Audience - All Right Reserved