Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why and How the Software Supply Chain Is Increasingly Under Threat
Cybersecurity

Why and How the Software Supply Chain Is Increasingly Under Threat

Bill DoerrfeldBy Bill DoerrfeldNovember 20, 20225 Mins Read
Facebook Twitter LinkedIn Email
software supply chain threat
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Open-source risks continue to threaten digital business stability. Software supply chain incidents such as Log4j and Spring4Shell have put billions of devices at risk for remote-control execution attacks. Not only that, but a multitude of other vulnerabilities lie dormant, known or unknown, within the root of modern software applications that rely heavily upon countless open-source projects. As a result, studies have found an extraordinary 742% average annual increase in supply chain attacks over the past three years.

In response to this widening software supply chain issue, organizations are beginning to standardize their software consumption process and better manage dependencies. There’s also a government-led impetus to evolve — part of the 2021 presidential Executive Order on Improving the Nation’s Cybersecurity requires software companies working with the U.S. government to provide a software bill of materials (SBOM) that lists project dependencies.

Sonatype’s The State of the Software Supply Chain report provides fascinating data on the global software supply chain threat. The lengthy report calculates vulnerabilities across popular package managers and weighs the maturity of the security response to pressing risks. Below, I’ll summarize the study’s key points to better understand how information technology (IT) divisions should address open-source security in the face of today’s interconnected software supply chain.

Open-Source Demand Increases, as Do Vulnerabilities

Open-source project creation and downloads have hit all-time highs. For example, the report found 396K Python projects within the PyPI ecosystem, with a 33% year-over-year download growth. The total volume of requests in 2022 is estimated to be 3.1 trillion. This figure represents the cumulative number of downloads across major open-source package managers Java (Maven), JavaScript (npm), Python (PyPI), and .NET (NuGet).

Although 2022 saw the largest volume of open-source downloads, there was a slight decrease in the acceleration of open-source adoption and usage. This is perhaps due to new procurement policies emerging in response to Log4j. It’s good that organizations are waking up to the reality of open-source threats — especially since Sonatype discovered 97,334 suspected malicious packages in their monitoring processes.

Nevertheless, a lack of knowledge and visibility into dependencies is still a pressing issue. Six of every seven project vulnerabilities come from transitive dependencies, which are additional components a software tool depends upon to function but which are not always accessible. Dependency confusion can arise from tactics such as typosquatting or brandjacking. Or, legitimate open-source dependencies may unknowingly include code injections contributed by actors with nefarious intent.

Other Software Supply Chain Metrics

So, what is the state of individual projects? Well, common libraries have 5.7 dependencies on average. Although only 10% of these have a vulnerability directly affecting the code, 62% had a direct security issue or a transitive vulnerability arising from their third-party dependency tree. At large, this fact means that 1.2 billion vulnerable dependencies are being consumed each month.

A random sample of 55,000 enterprise applications revealed that 68 of the applications had known vulnerabilities in the underlying open-source software components. However, these are probably incomplete numbers, as it’s tricky to sum up the total vulnerability landscape. Since hackers target popular libraries over more niche or inactive projects, popular projects have more known vulnerabilities, not inherent vulnerabilities.

There is truly a wide surface area to cover, and the dependency tree is never-ending. Astonishingly, engineers have to track an average of 1,500 dependency changes per year per application. This underscores the need for SBOMs, as well as an automated approach to auditing dependencies.

Global Regulations to Mature Software Supply Chain Integrity

Software supply chain security is still undergoing a maturation process. Most companies still aren’t cataloging SBOMs or performing remediation for every vulnerability. Yet, strides are underway to formalize this process, and much of the future of supply chain security might be regulation-led.

For example, in January 2022, the Office of Management and Budget (OMB) issued the Memorandum: “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles,” encouraging alignment with Cybersecurity and Infrastructure Security Agency (CISA) ‘s five-point zero trust model.

Another example of new regulation: “When a federal agency (purchaser) acquires software or a product containing software, the agency should receive attestation from the software producer that the software’s development complies with government-specified secure software development practices.” — Software Supply Chain Security Guidance Under Executive Order (E.O.) 14028, NIST (National Institute of Standards and Technology)

Other countries have followed suit, albeit with fewer mandatory conditions. For example, Germany recently issued the Information Security Act 2.0 (IT-SiG), and Japan passed an Act on Promotion of Economic Security by Integrated Implementation of Economic Measures. Similar proclamations to combat supply chain risks have been seen from agencies like European Agency for Cyber Security (ENISA) and NATO.

Future Outlooks

As digital reliance soars, the number of vulnerabilities will likely continue to grow, and along with it, the frequency of attacks on enterprise software. Thirty-one percent of businesses estimate a cyber attack happens at least once a week. These attacks could result in ransomware attacks, cryptojacking, or large sweeping denial-of-service campaigns.

Much of the software surface area has yet to be discovered. The report found that only 7% of businesses have looked at their wider supply chain. It will take knowledge sharing to improve development security practices. It will also take a coordinated effort from the open-source community to democratize access to the necessary security tooling. For example, emerging standards like Sigstore and SLSA (Supply Chain Levels for Software Artifacts) are set to add new layers to protect the provenance of open-source packages.

“This average annual growth rate over the last three years is nothing short of astonishing and underlines the need to step-up governmental and industry-driven efforts to curb and defend against these attacks,” says the report.

For further insights and deeper analysis into how this data was generated, readers can view the entire 8th Annual State of the Software Supply Chain report, presented by Sonatype.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

featured metrics Open-Source Software Ransomware software supply chain supply chain management
Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live

July 2, 2025

Slack API Terms Update Restricts Data Exports and LLM Usage

July 2, 2025

Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

July 1, 2025

SignUp Software Insights on Optimizing Dynamics 365 With ISV Partnerships

July 1, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live
  • Slack API Terms Update Restricts Data Exports and LLM Usage
  • Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3
  • SignUp Software Insights on Optimizing Dynamics 365 With ISV Partnerships
  • Hottest Cloud Vendors: Google Cloud Still #1, But Oracle, SAP Closing In

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.