Supply Chain Hacking Breaks Cyber Trust

Bringing together leaders, lawmakers and lawbreakers. Host Luke Fox explores how innovations in business and technology are redefining our trust in security measures.

 

The principle of trust isn’t unique to human relationships. It’s also a significant part of technology infrastructures. This cyber trust is what lets software updates and patches from the development company to their customers. Unfortunately, hackers can infiltrate these exchanges, appearing trustworthy but are a wolf in sheep’s clothing.

Such is the case with supply chain hacking and the cybersecurity story of the year—Solar Winds. Lending his expertise on the topic and explaining hacking’s evolving world is industry expert, Cylance founder, and best-selling author Stuart McClure.

“Supply chain hacking is one of the most overlooked aspects of cybersecurity. An antivirus signature-based approach isn’t going to stop this,” McClure said. He explained that a signature-based approach is deeply flawed. “It only detects viruses it’s seen before, that match known signatures,” he said.

Realizing this system was broken, McClure revolutionized virus detection by using AI and machine learning when founding Cylance. “We applied machine learning and data science, learning from past viruses, and predicting in real-time whether something was virus-like,” McClure said.

McClure went on to explain the SolarWinds hack based on what is publicly known. It goes back to misplaced trust.

“The number one target of supply chain hacking is to hack the build server that houses all the code and before it’s compiled and signed with the digital certificate. Malicious code now looks legitimate,” McClure said. That appears to be what hackers did with SolarWinds. The hackers got into the code, it was released to users, and the customer networks trusted it and let it in.

SolarWinds illustrates the weaknesses of supply chain security, breaking trust in the technology and business partners. McClure warned, “This case is not unique, and it’s not the first time this level of attack occurred. What is unique is that they hit a core element, hacking just one system to infiltrate many eventually.”

Catch Up On Previous Episodes of The Trust Revolution!

Follow us on social media for the latest updates in B2B!

Image

Latest

authenticity for success
Tara Salvietti: Organization and Authenticity for Success
December 29, 2024

Tara Salvietti, Senior Manager on the Marketing Partnerships Activation Team at Extreme Networks, reveals her superpowers of exceptional organization and building authentic connections. Her unique organization method, such as CC-ing herself on emails as task reminders, ensures composure in complex situations. Tara emphasizes the importance of treating everyone with respect and forging genuine relationships across…

Read More
embracing growth
Jonathan Hooper: Embracing Growth with the Sponge Mindset
December 29, 2024

Jonathan Hooper, Director of Americas Distribution at Extreme Networks, shares his insights on achieving enduring career success through continuous improvement. Advocating for the “Sponge Mindset,” he highlights the importance of being coachable, setting goals, staying curious, and actively building a network. Drawing inspiration from James Clear’s “Atomic Habits,” Hooper emphasizes the power of small changes…

Read More
professional growth
Benj Nopper: Professional Growth and Authenticity at Extreme
December 29, 2024

Benj Nopper, SLED Account Manager at Extreme, shares his career journey, emphasizing authenticity, mentorship, and personal development as keys to success. Drawing from lessons in “The Go-Giver,” he highlights the importance of honesty and vulnerability in building trust with customers and colleagues. Nopper credits mentorship from Baylor University and Extreme colleagues as transformative, advocating for…

Read More
intellectual property
Cherise Cross: Balancing Intellectual Property and Community at Extreme Networks
December 28, 2024

Cherise Cross, Intellectual Property Paralegal at Extreme Networks, plays a pivotal role in managing intellectual property rights while supporting the legal team with precision and care. She thrives in the company’s close-knit, inclusive culture, finding meaningful connections through the Asian Pacific Islander (API) group that celebrates shared heritage and cultural interests. Outside of work, Cherise…

Read More