Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Software Supply Chains Are Vulnerable: 89% of Code Bases Use Outdated Open Source
Cybersecurity Minute

Why Software Supply Chains Are Vulnerable: 89% of Code Bases Use Outdated Open Source

Chris HughesBy Chris HughesMarch 6, 2023Updated:March 28, 20233 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 55 of the Cybersecurity Minute, Chris Hughes shares his major takeaways from a recent Synopsys cybersecurity report.

This episode is sponsored by Acceleration Economy’s Digital CIO Summit, taking place April 4-6. Register for the free event here. Tune in to the event to hear from CIO practitioners discuss their modernization and growth strategies.

Highlights

00:35 — Synopsys has published its 2023 Open Source Security and Risk Analysis Report. Chris sees some interesting findings in it that don’t bode well for software supply chain security.

00:56 — To put what’s going on with software supply chain security in context, Chris reminds us of a report from Sonatype that said software supply chain attacks are up over 700% in the last three years. Other incidents including Log4j, Codecov, SolarWinds, and more have made the software supply chain a hot topic.

01:07 — Malicious actors have realized they can target a single organization, a single open-source software project or component, and have a massive downstream impact on thousands of organizations and millions of individuals.

01:18 — Synopsys did a security assessment of more than 1,700 different code bases. And what it found is alarming. It found that 89% of code bases contained open-source software that was more than four years out of date and that 91% of those code bases contained components that had had no new development in the last two years. Plus, 84% of all the examined commercial and proprietary code bases had several high-risk vulnerabilities.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

01:49 — From an attacker’s perspective, you just have this massive ecosystem of open-source software that’s pervasive across every aspect of our software supply chain: from mundane, leisurely applications that we all use in our daily activities, to the most critical infrastructure including industrial control systems and national defense and military systems.

02:12 — Organizations simply aren’t keeping an eye on their open-source software hygiene. They have a lot of outdated open-source software in their applications, ecosystem, and infrastructure. Most of it is out of date and contains vulnerabilities. It’s just sitting there, waiting for malicious actors to take advantage of it.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.

02:35 — This is why we see Gartner and other organizations predicting that, in a couple of years, 50% of organizations are going to experience a software supply chain attack. It’s just the nature of the ecosystem at the moment. Organizations have been using open-source software for a variety of reasons, among them efficiency and the ability to speed up development time-to-market, cost savings, and more.

See the Cybersecurity Top 10 shortlist

02:56 — But the reality is that using open-source software has a trade-off when you’re not being attentive enough to security. This means that you’re not keeping dependencies up to date and not attending to transitive dependencies that have vulnerabilities. Malicious actors are paying attention, and they are taking a lot of interest, realizing the value of this software and how it can be such an efficient attack vector. They can compromise a single target and have a massive impact downstream across the entire ecosystem.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

featured Open-Source Software software supply chain vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

IBM Tackles AI Data Complexity with New watsonx.data Integration and Intelligence Software

June 20, 2025

Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators

June 20, 2025

Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure

June 20, 2025

The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster

June 19, 2025
Add A Comment

Comments are closed.

Recent Posts
  • IBM Tackles AI Data Complexity with New watsonx.data Integration and Intelligence Software
  • Enterprises Ramp Up Use of Multiple AI Models, Third-Party Apps, and AI-Native Innovators
  • Microsoft Introduces AI Model Safety Rankings to Guide Developer Choices on Azure
  • The New Christian Klein: Supercharges SAP and Helps Europe Avoid Data-Center Disaster
  • Inside Rabbit’s Strategy to Automate Cloud Cost Optimization for Engineering Teams with Balazs Molnar | Cloud Wars Live

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.