Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

All stages of TechCrunch regain early release prices for limited time

Stripe, the first employee of Stripe and founder of Fintech Increase, bought the bank

The final GOP bill organizes renewable energy and hydrogen, but lifts nuclear and geothermal

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Assessing risk before deployment
Identity

Assessing risk before deployment

userBy userFebruary 11, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 11, 2025Hacker NewsSoftware Security/Threat Intelligence

Protect your software supply chain

Imagine you are considering a new car for your family. Before purchasing, we will assess its safety rating, fuel efficiency and reliability. You may take it to a test drive to ensure it meets your needs. The same approach must be applied to software and hardware products before integration into your organization’s environment. To avoid purchasing a car without knowing its safety features, you should not deploy software without understanding the risks of implementing it.

Rising threat of supply chain attacks

Instead of attacking an organization head-on, cybercriminals know that they can infiltrate the software supply chain, such as sliding counterfeit parts onto the assembly line. According to the 2024 Sonatype State in Software Supply Chain Report, attackers discovered more than 512,847 malicious packages last year alone, with over 512,847 malicious packages infiltrating at an astonishing rate, up 156% from the previous year. It’s there. Traditional security tools and processes often overlook these threats and organizations are not ready.

One of the main examples of 2024 was a year-long supply chain attack discovered in the Python package index (PYPI). The attacker wants to upload a malicious package disguised as a legitimate AI chatbot tool and integrate the developer into the project to integrate the developer. These packages contained harmful code designed to steal sensitive data and execute remote commands on infected systems. Because Pypi is widely used in a variety of industries, the attack could compromise thousands of applications before Kaspersky’s security researchers could detect and report malicious activity. This incident highlights that attackers are increasingly utilizing trusted repositories to distribute malware, and reinforces the need for additional detailed measurements when evaluating software.

A practical approach to risk assessment: product security testing

Organizations need structured, iterative methods for deployment into their environment before assessing software and hardware risks. Known as product security testing (PST), this process is answering key questions.

What risks does this product pose to my network? Do I need to use this product or is there a safer alternative? If used, what mitigation should be made to minimize risk?

PST is more than just scanning for vulnerabilities. Understand how your product works in a particular environment and determine the impact of the overall risk. Given the large number of third-party components used in Modern IT, it is unrealistic to scrutinise all software packages equally. Instead, security teams should prioritize their efforts based on business impact and surface exposure of attacks. Highly useful applications that frequently communicate with external services must undergo product security testing, while low-risk applications can be evaluated via automated, resource-intensive methods. Whether pre-development or as a retrospective analysis, a structured approach to PST allows organizations to focus on protecting their most important assets first, while maintaining the integrity of the entire system. It is guaranteed to hit.

Learn to think about red and act blue

The SANS SEC568 course is designed to build practical skills on PST. This focuses on black box testing, which is a way to simulate real conditions where source code is not available. This makes it highly applicable to valuing third-party products that the organization cannot directly control. This course follows Think Red, Act Blue principles. Learning offensive tactics will help organizations to defend better.

Product security testing never prevents violations of third party controls, but it must allow organizations to make informed decisions about their defensive attitudes and response strategies. Many organizations follow a standard process of identifying needs, selecting products and deploying without deep security assessments. This lack of scrutiny can cause scrambling to determine the impact of a supply chain attack.

By incorporating PST into your decision-making process, security teams acquire important documents, including dependency mapping, threat models, and specific mitigation tailored to the technology they are using. This aggressive approach reduces uncertainty and allows for faster and more effective responses when vulnerabilities appear. Rather than relying solely on mitigation across a wide range of industry, organizations with PST documents can implement target security controls that minimize risk before a violation occurs.

Who is taking advantage of product security testing?

Regardless of your position, having a strong foundation for product security testing improves the security attitude and preparation of your entire organization. The obvious conformance is that a product security test team can leverage these methodologies to evaluate third-party software as well as their own internal products, but product security tests are not limited to specific roles. This is a valuable skill set that strengthens various positions within your organization. Security auditors can use PST to tailor assessments to an organization’s own risk and compliance needs, while intrusion testers can go beyond simple vulnerability scans to analyze unknown protocols and proprietary software . Application developers benefit from helping attackers leverage security flaws and write more secure code from the start, but SOC analysts use these skills. It can detect and mitigate threats introduced by new software and hardware. Even decision makers can gain insights from PST. This is because it helps you make informed choices about risk, security investments, and mitigation strategies. It is important to remember that it is impossible to detect, mitigate, misuse, or develop things that we do not understand.

To gain hands-on experience in product security testing, consider joining Orlando SEC568 from April 13-18, 2024. This training provides the technical foundation needed to effectively assess software and hardware security. Applying a structured approach to product security testing, just like riding a car for a test drive before purchasing, enables organizations to fully understand the potential risks before deployment. Masu. By following a repeatable methodology, security teams can reduce risks and prepare them for future threats.

Note: This article was skillfully written and contributed by Douglas McKee, executive director of threat research at SonicWall, and the lead author and instructor of SANS SEC568.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAI Investments jumped 62% to $110 billion in 2024, but startup funding fell 12% overall
Next Article UK’s major auto industry skills drive the transition to fuel EVs
user
  • Website

Related Posts

Large Android scam business has been revealed: Iconads, KaleIdoscope, SMS Malware, NFC Scams Identified apps are designed to load out-of-context ads on users’ screens and hide icons from the device’s home screen launcher, making it difficult for victims to remove them according to the company’s Satori Threat Intelligence and Research team. The app was then removed from the Play Store by Google. Advertising fraud schemes accounted for 1.2 billion bid requests per day due to their high activity. The majority of Iconads-related traffic comes from Brazil, Mexico and the United States. Iconads is a variant of the threat tracked by other cybersecurity vendors under the name Hiddedads and Vapor, and since at least 2019, malicious apps have been sliding around the Google Play Store repeatedly. Some of the common features of these apps include the use of obfuscation for concealment…

July 3, 2025

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Steal User Assets

July 3, 2025

The Hidden Weaknesses in AI SOC Tools that No One Talks About

July 3, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

All stages of TechCrunch regain early release prices for limited time

Stripe, the first employee of Stripe and founder of Fintech Increase, bought the bank

The final GOP bill organizes renewable energy and hydrogen, but lifts nuclear and geothermal

Not everyone is excited about DMs on the thread

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.