Supply Chain Hacking Breaks Cyber Trust

Bringing together leaders, lawmakers and lawbreakers. Host Luke Fox explores how innovations in business and technology are redefining our trust in security measures.

 

The principle of trust isn’t unique to human relationships. It’s also a significant part of technology infrastructures. This cyber trust is what lets software updates and patches from the development company to their customers. Unfortunately, hackers can infiltrate these exchanges, appearing trustworthy but are a wolf in sheep’s clothing.

Such is the case with supply chain hacking and the cybersecurity story of the year—Solar Winds. Lending his expertise on the topic and explaining hacking’s evolving world is industry expert, Cylance founder, and best-selling author Stuart McClure.

“Supply chain hacking is one of the most overlooked aspects of cybersecurity. An antivirus signature-based approach isn’t going to stop this,” McClure said. He explained that a signature-based approach is deeply flawed. “It only detects viruses it’s seen before, that match known signatures,” he said.

Realizing this system was broken, McClure revolutionized virus detection by using AI and machine learning when founding Cylance. “We applied machine learning and data science, learning from past viruses, and predicting in real-time whether something was virus-like,” McClure said.

McClure went on to explain the SolarWinds hack based on what is publicly known. It goes back to misplaced trust.

“The number one target of supply chain hacking is to hack the build server that houses all the code and before it’s compiled and signed with the digital certificate. Malicious code now looks legitimate,” McClure said. That appears to be what hackers did with SolarWinds. The hackers got into the code, it was released to users, and the customer networks trusted it and let it in.

SolarWinds illustrates the weaknesses of supply chain security, breaking trust in the technology and business partners. McClure warned, “This case is not unique, and it’s not the first time this level of attack occurred. What is unique is that they hit a core element, hacking just one system to infiltrate many eventually.”

Catch Up On Previous Episodes of The Trust Revolution!

Follow us on social media for the latest updates in B2B!

Latest

Can Fitness Be More Accessible?
How Technology Can Make Fitness More Accessible
October 20, 2021
  Key Points: Fitness members want an easy tool to use on their mobile device to manage classes, memberships, in-gym daycare and other fitness services provided by gyms. Customers of Daxko Read more
Helping Restaurants of All Sizes with the Restaurant Repair Process
Helping Restaurants of All Sizes with the Restaurant Repair Process
October 20, 2021
  Running a restaurant is hard work especially if you are a small business. There are a lot of tasks that go into day-to-day operations that can all be derailed if the wrong piece of equipment Read more
EP 26: VRF Systems Provide Flexible Heating & Cooling Options: 10 Minutes To A Better Building
October 20, 2021
On this episode of 10 Minutes To A Better Building, Host Tyler Kern talked with Jason Lawrence, Ductless Technical Specialist at Boland Trane, which provides HVAC solutions and a network of more than Read more