Supply Chain Hacking Breaks Cyber Trust

Bringing together leaders, lawmakers and lawbreakers. Host Luke Fox explores how innovations in business and technology are redefining our trust in security measures.


The principle of trust isn’t unique to human relationships. It’s also a significant part of technology infrastructures. This cyber trust is what lets software updates and patches from the development company to their customers. Unfortunately, hackers can infiltrate these exchanges, appearing trustworthy but are a wolf in sheep’s clothing.

Such is the case with supply chain hacking and the cybersecurity story of the year—Solar Winds. Lending his expertise on the topic and explaining hacking’s evolving world is industry expert, Cylance founder, and best-selling author Stuart McClure.

“Supply chain hacking is one of the most overlooked aspects of cybersecurity. An antivirus signature-based approach isn’t going to stop this,” McClure said. He explained that a signature-based approach is deeply flawed. “It only detects viruses it’s seen before, that match known signatures,” he said.

Realizing this system was broken, McClure revolutionized virus detection by using AI and machine learning when founding Cylance. “We applied machine learning and data science, learning from past viruses, and predicting in real-time whether something was virus-like,” McClure said.

McClure went on to explain the SolarWinds hack based on what is publicly known. It goes back to misplaced trust.

“The number one target of supply chain hacking is to hack the build server that houses all the code and before it’s compiled and signed with the digital certificate. Malicious code now looks legitimate,” McClure said. That appears to be what hackers did with SolarWinds. The hackers got into the code, it was released to users, and the customer networks trusted it and let it in.

SolarWinds illustrates the weaknesses of supply chain security, breaking trust in the technology and business partners. McClure warned, “This case is not unique, and it’s not the first time this level of attack occurred. What is unique is that they hit a core element, hacking just one system to infiltrate many eventually.”

Catch Up On Previous Episodes of The Trust Revolution!

Follow us on social media for the latest updates in B2B!


mastering AV sales strategies
Mastering AV Sales Strategies: A Diverse Market Requires Understanding Individual Needs
December 8, 2023

Mastering AV sales strategies in a global professional audio-visual (Pro AV) market, poised to reach $79.2 billion by 2028, requires much attention to detail. The surge in demand from corporate, government, and institutional sectors, driven by the need for enhanced productivity and efficient working environments, gives AV sales pros a lot of opportunity. In […]

Read More
cybersecurity in healthcare
Cybersecurity in Healthcare: Addressing the Growing Threat
December 8, 2023

To keep up with the growing threats, cybersecurity in healthcare is a high-level priority. The recent ransomware attack on Ardent Health underscores a stark reality for the healthcare industry: cyber threats are a significant and ongoing challenge. Mike Saylor, the CEO of Blackswan Cybersecurity, LLC, sheds light on the complexities of cybersecurity in healthcare. […]

Read More
effective debt management
Effective Debt Management Holds the Keys to Small Business Cash Flow and Growth
December 8, 2023

Effective debt management through a robust accounts receivable system is essential for small business cash flow and growth, necessitating automated payment schedules and strategic policy adjustments. Collaborating with a collection agency as a strategic partner can enhance revenue recovery while preserving positive customer relationships. How critical is effective debt management for the financial health […]

Read More