April 21, 2023, 6:04 p.m. | Chris Garland

Security Boulevard securityboulevard.com

Introduction The IT supply chain is filled with software vulnerabilities, many resulting from significant code reuse across multiple vendors. The economic forces at play form a ‘race to the bottom’ competitive landscape, where feature velocity and low cost drive development practices. Often, basic Secure Systems Development Lifecycle (SSDLC) practices, such as baking in static code […]


The post Vendor Re-Use Opens the Aperture on Many Vulnerabilities appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.


The …

basic blog code code reuse competitive cost development drive eclypsium economic enterprise introduction lifecycle low play practices reuse security software software vulnerabilities supply supply chain supply chain security systems systems development lifecycle vendor vendors vulnerabilities

Incident Response Lead

@ Blue Yonder | Hyderabad

GRC Analyst

@ Chubb | Malaysia

Information Security Manager

@ Walbec Group | Waukesha, WI, United States

Senior Executive / Manager, Security Ops (TSSQ)

@ SMRT Corporation Ltd | Singapore, SG

Senior Engineer, Cybersecurity

@ Sonova Group | Valencia (CA), United States

Consultant (Multiple Positions Available)

@ Atos | Plano, TX, US, 75093