all InfoSec news
Vendor Re-Use Opens the Aperture on Many Vulnerabilities
Security Boulevard securityboulevard.com
Introduction The IT supply chain is filled with software vulnerabilities, many resulting from significant code reuse across multiple vendors. The economic forces at play form a ‘race to the bottom’ competitive landscape, where feature velocity and low cost drive development practices. Often, basic Secure Systems Development Lifecycle (SSDLC) practices, such as baking in static code […]
The post Vendor Re-Use Opens the Aperture on Many Vulnerabilities appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.
The …
basic blog code code reuse competitive cost development drive eclypsium economic enterprise introduction lifecycle low play practices reuse security software software vulnerabilities supply supply chain supply chain security systems systems development lifecycle vendor vendors vulnerabilities