Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Software Supply Chains Are Vulnerable: 89% of Code Bases Use Outdated Open Source
Cybersecurity Minute

Why Software Supply Chains Are Vulnerable: 89% of Code Bases Use Outdated Open Source

Chris HughesBy Chris HughesMarch 6, 2023Updated:March 28, 20233 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 55 of the Cybersecurity Minute, Chris Hughes shares his major takeaways from a recent Synopsys cybersecurity report.

This episode is sponsored by Acceleration Economy’s Digital CIO Summit, taking place April 4-6. Register for the free event here. Tune in to the event to hear from CIO practitioners discuss their modernization and growth strategies.

Highlights

00:35 — Synopsys has published its 2023 Open Source Security and Risk Analysis Report. Chris sees some interesting findings in it that don’t bode well for software supply chain security.

00:56 — To put what’s going on with software supply chain security in context, Chris reminds us of a report from Sonatype that said software supply chain attacks are up over 700% in the last three years. Other incidents including Log4j, Codecov, SolarWinds, and more have made the software supply chain a hot topic.

01:07 — Malicious actors have realized they can target a single organization, a single open-source software project or component, and have a massive downstream impact on thousands of organizations and millions of individuals.

01:18 — Synopsys did a security assessment of more than 1,700 different code bases. And what it found is alarming. It found that 89% of code bases contained open-source software that was more than four years out of date and that 91% of those code bases contained components that had had no new development in the last two years. Plus, 84% of all the examined commercial and proprietary code bases had several high-risk vulnerabilities.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

01:49 — From an attacker’s perspective, you just have this massive ecosystem of open-source software that’s pervasive across every aspect of our software supply chain: from mundane, leisurely applications that we all use in our daily activities, to the most critical infrastructure including industrial control systems and national defense and military systems.

02:12 — Organizations simply aren’t keeping an eye on their open-source software hygiene. They have a lot of outdated open-source software in their applications, ecosystem, and infrastructure. Most of it is out of date and contains vulnerabilities. It’s just sitting there, waiting for malicious actors to take advantage of it.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.

02:35 — This is why we see Gartner and other organizations predicting that, in a couple of years, 50% of organizations are going to experience a software supply chain attack. It’s just the nature of the ecosystem at the moment. Organizations have been using open-source software for a variety of reasons, among them efficiency and the ability to speed up development time-to-market, cost savings, and more.

See the Cybersecurity Top 10 shortlist

02:56 — But the reality is that using open-source software has a trade-off when you’re not being attentive enough to security. This means that you’re not keeping dependencies up to date and not attending to transitive dependencies that have vulnerabilities. Malicious actors are paying attention, and they are taking a lot of interest, realizing the value of this software and how it can be such an efficient attack vector. They can compromise a single target and have a massive impact downstream across the entire ecosystem.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

featured Open-Source Software software supply chain vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Google Remains World’s Hottest Cloud Vendor; Oracle Rising, Microsoft Surging

September 16, 2025

Google Cloud Hottest, Oracle and Microsoft Also Rock

September 16, 2025

Oracle Blows Past Microsoft in RPO Race as Hyperscaler Pipeline Hits $1.12 Trillion

September 15, 2025

Hyperscaler Pipeline $1.1 Trillion; #1 Oracle $455B, #2 Microsoft $368B

September 15, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Google Remains World’s Hottest Cloud Vendor; Oracle Rising, Microsoft Surging
  • Google Cloud Hottest, Oracle and Microsoft Also Rock
  • Oracle Blows Past Microsoft in RPO Race as Hyperscaler Pipeline Hits $1.12 Trillion
  • Hyperscaler Pipeline $1.1 Trillion; #1 Oracle $455B, #2 Microsoft $368B
  • AI Agent & Copilot Podcast: PwC Leader On Business Transformation, Cloud and AI Growth

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

The Agentic Enterprise: How Microsoft and Industry Leaders Are Redefining Work Through AI

September 2, 2025

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }