Supply chain security is probably your weakest link. Are organizations learning lessons?

Supply chain security is probably your weakest link. Are organizations learning lessons?

 By Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies.

The interconnectedness of the global marketplace means that a single supply chain disruption can compromise hundreds or thousands of organizations. To provide context, the average auto manufacturer retains 250 tier-one suppliers and 18,000 across the full value chain. Proctor & Gamble has over 75,000 suppliers and the French oil company Total does business with more than 150,000 different firms.

Organizations that fail to future-proof systems against cyber supply chain threats may see their own demise, along with the collapse of their industry, diminished marketplace results, loss of customer trust, and limited opportunities for future business growth. Does your organization take the reality of supply chain threats seriously enough? Does your business continuity plan provide a robust response to a supply chain attack?

The latest in supply chain breaches:

Healthcare has had several massive supply chain breaches. Last year, the National Health Service in the UK (NHS) experienced a breach following a cyber attack on one of its suppliers. This disrupted the 111 emergency advice line, interrupted ambulance dispatch, scrambled emergency prescribing, limited access to patient records, harmed appointment availability and affected patient referrals. Staffing services had to resort to pen and paper, not for the first and I suspect last time, unfortunately.

Fast-forward to the MOVEit breach, which began in May of this year, where attackers exploited a zero-day vulnerability in order to infiltrate a massive number of companies. Attackers listed affected company names and data on their leak site with the intention of having firms pay a ransom to recover data. And that’s only the beginning…

Not only were at least 1,000 organizations affected, but 60 million individuals had data compromised through the MOVEit breach. In Canada, the personal data of as many as 100,000 past and present government employees is believed to have been affected. These tallies reflect a fraction of the total number of organization and individuals who will likely suffer on account of this supply chain breach. It has now been estimated that the cost of the MOVEit breach sits at around $10 billion and rising.

The MOVEit story will continue to go on and on for months on-end. There are now multiple class-action lawsuits filed against the service provider, Progress Software and potentially lawsuits coming in cases where organizations have not been deemed to have fully assessed their supply chain risk and developed necessary mitigation plans. The era of cyber litigation and class-actions is upon us and you better be prepared.

The worst of it is that none of this is new. We’ve seen cyber attackers, indeed this same threat actor, exploit vulnerabilities related to managed file transfers in the past. The critical questions right now are: What due diligence are organizations doing around these breaches? Why are we not learning from the mistakes? What have we learned about the supply chain? There are hugely instructive lessons available to us here.

The questions that need to be asked:

Are we at a place where we believe that through the tick-box exercises, or achieving certification — for example, an ISO 27001 or cyber essentials within the U.K. — that organizations have then done enough and can simply declare their efforts sufficient?

As a consumer, I wonder whether we’re really safeguarding and prioritizing our most important data. Are we putting too much trust in our suppliers in assuming that that they will look after the data for us? That’s my big concern. As mentioned before, there are huge lessons to be learned from the MOVEit breach.

Do organizations ask to get confidence in the code that’s being written? Do they ask to see internal scan results and external scan results? Do they ask to see how a supplier’s CI/CD pipeline has been established so that they can see any misconfigurations or vulnerabilities within it and remediate or even better, auto-remediate in a timely manner? Most importantly, have we fully mapped our supply chain, do we understand where our critical suppliers’ dependencies are and who they are dependent on?

Sometimes, the questions are asked, but the answers are false…

In major companies, administrators are sometimes asked to tick boxes assuring vendors, partners or suppliers ‘yes, we have this level of compliance, we have this level of segmentation, we use best practices, we do scanning…etc’. But what’s happening is that the staff aren’t necessarily following through on any of the assurances that they’re signing their names to.

Giving confidence in assurances and compliance without having the technical expertise come in to do the work is a surefire path to cyber security mayhem.

The path forward for enterprises:

One part of the path forward involves red teaming. In so doing, organizations should be saying to their suppliers and business partners, ‘We are trusting you with HR data, with payroll data or with other confidential data. As part of our due diligence and contractual agreements, we would like to hire external parties and obtain a finer understanding of the services we’re getting and the corresponding software code to see if the service is fit for purpose.’

Something that we don’t talk about: Organizations need to obtain assurance alerts around technical guardrails. Setting up service provisioning is fine. However, as a buyer, I would need assurances around the quality of that service – the guardrails that are in-place. For me, that would be critically important. For instance, if you consume a service from ServiceNow or Workday — those are just examples — how do you ensure that the services maintain the highest levels of integrity, confidentiality and availability? (The CIA triad in cyber security.)

It feels like far too much trust is being given to these organizations to satisfy these requirements. Perhaps we should be in a place where every vendor that provides a service should have to verify that the service is provided in such a way as to ensure data encryption. And then, as the company that purchases the service, perhaps the company should own the encryption key. Fully encrypted data has no commercial value and will therefore not be a target.

To protect proprietary data and source code, we also need to do more obfuscation, ensuring that no data is shared as a part of the supply chain side – apart from what’s critically necessary to share. And that’s sometimes difficult, especially with things like payroll systems, for example. If you’ve got a payroll system, you tend to ask employees to log onto that system so that they can see the details; so that they can see their paycheck, and what’s gone to taxes…etc. So there’s a large data-egress.

Some of security comes down to ensuring that it’s essential, but minimal, information that gets transferred and shared and nothing more. It’s difficult when you get down to file transfer, because among a large file transfer, you have to spot the large egress of data being made.

In relation to the MOVEit breach, based on the technical controls, it should have been very clear for the service provider that there was a huge amount of data being exfiltrated. More likely than not, there was something around the operating procedure of the organization that led to the data breach. Systems should have been set up so that data could only come in from a trusted source and data could only go out to a trusted source. Thus, even if there were a breach, they’d have a level of authentication into the systems.

In addition, there should have been a second level of control that actually, that said ‘there’s a large amount of data getting moved across to something that we don’t know about. There should have been a behavioral control that kicked in and that said ‘this is not normal.’ Let’s stop it, flag it, and can someone have a look to see what it was. But that didn’t happen.

I don’t think that there was a second layer of behavioral controls at all.

It’s also about forcing best practices, maturing areas of leadership and managing risk, which are often antithetical to what security teams actually want to be doing. The stuff that I just mentioned isn’t the exciting stuff that people want to work on. Security professionals want to work on the shiny stuff, with the cool tools. This is absolutely, totally different.

The path forward for consumers:

As I mentioned earlier, the MOVEit data breach has affected 60 million people. To put the number into perspective, an equivalent number of sports fans would fill the largest sports venue in the U.K., Wembley Stadium, 600X over. Not only do employers need to take action – arguably, consumers like you and I need to take action as well.

However, how do we ask our employers for assurances around how they’re controlling and managing our data? Employees must abide by a growing list of cyber security rules within day-to-day role, but I think that employees also need to hold employers accountable around the safeguarding of our private information.

It’s probably not something that employees are comfortable doing, but perhaps we’ve reached a tipping point. Employees need to say, ‘I’m interested in understanding the best practices that you’ve set up around protecting my data; around data loss prevention. Have you invested in zero-trust, for example?’ Or ‘Would you know if someone accessed my HR record?’ ‘Would that set of an alert in your system?’ And, ‘Would you know if an API were suddenly and illicitly connected to the payroll data system?’ ‘Would your organization be able to identify a large and unusual data egress?’

But I’ve rarely heard of anyone asking such questions.

Further insights:

Ensure that your suppliers are adopting a proactive, innovative approach to cyber security, with a sharp focus on prevention and the implementation of best practices; from the early stages of code development all the way across the supply chain. By embracing these methodologies and implementing robust systems, you can minimize the potential impact and scope of supply chain attacks. Or you might be able to avoid them in entirety.

I don’t think we are managing supply chain risk sufficiently. If we don’t, we may well end up in costly litigation.

For more insights from Global CISO Deryck Mitchelson, please see CyberTalk.org’s past coverage. Lastly, to receive more timely cyber security news, insights and cutting-edge analyses, please sign up for the cybertalk.org newsletter.

Super Mario Bros. Wonder Spoilercast | All Things Nintendo

Super Mario Bros. Wonder Spoilercast | All Things Nintendo

This week on All Things Nintendo, Brian is joined by YouTube and Twitch personality Fadel AKA GamesCage to nerd out about all the little surprises and delights found in Super Mario Bros. Wonder. Both Brian and Fadel have 100%’d the game, so be warned that this episode contains full spoilers for any and all portions of the latest 2D Mario platformer.

If you’d like to follow Brian on social media, you can do so on his Instagram/Threads @BrianPShea or Twitter @BrianPShea. You can follow Fadel on Twitter: @GamesCage_, YouTube: @GamesCage, and Twitch: GamesCage.

[embedded content]

The All Things Nintendo podcast is a weekly show where we celebrate, discuss, and break down all the latest games, news, and announcements from the industry’s most recognizable name. Each week, Brian is joined by different guests to talk about what’s happening in the world of Nintendo. Along the way, they’ll share personal stories, uncover hidden gems in the eShop, and even look back on the classics we all grew up with. A new episode hits every Friday!

Be sure to subscribe to All Things Nintendo on your favorite podcast platform. The show is available on Apple PodcastsSpotifyGoogle Podcasts, and YouTube.


00:00:00 – Introduction
00:01:08 – Spoiler-Free Mario Wonder Thoughts
00:10:12 – Spoiler Mario Wonder Thoughts
01:00:56 – Fadel’s Sonic Superstars Impressions
01:03:08 – Fadel’s Sonic Frontiers DLC Impressions


If you’d like to get in touch with the All Things Nintendo podcast, you can email AllThingsNintendo@GameInformer.com, messaging Brian on Instagram (@BrianPShea), or by joining the official Game Informer Discord server. You can do that by linking your Discord account to your Twitch account and subscribing to the Game Informer Twitch channel. From there, find the All Things Nintendo channel under “Community Spaces.”


For Game Informer’s other podcast, be sure to check out The Game Informer Show with hosts Alex Van Aken, Marcus Stewart, and Kyle Hilliard, which covers the weekly happenings of the video game industry!

Circleboom Review: The Best AI-Powered Social Media Tool?

Social media has become an integral part of our lives in today’s digital age. Whether you’re a social media user, blogger, or business, managing your social media accounts efficiently is crucial for success. That’s where tools like Circleboom come in and why I’ve taken the time…

Alex Ratner, CEO & Co-Founder of Snorkel AI – Interview Series

Alex Ratner is the CEO & Co-Founder of Snorkel AI, a company born out of the Stanford AI lab. Snorkel AI makes AI development fast and practical by transforming manual AI development processes into programmatic solutions. Snorkel AI enables enterprises to develop AI that works for…

The Black Box Problem in LLMs: Challenges and Emerging Solutions

Machine learning, a subset of AI, involves three components: algorithms, training data, and the resulting model. An algorithm, essentially a set of procedures, learns to identify patterns from a large set of examples (training data). The culmination of this training is a machine-learning model. For example,…

Content Creators: Build Your Media Business – Increase Production Valu – Videoguys

Content Creators: Build Your Media Business – Increase Production Valu – Videoguys

In the blog post “Consider Creators As You Would Any Other Media Entrepreneur, Say Gary Vee and Taylor Lorenz” on NAB Amplify, Taylor Lorenz and Gary Vaynerchuk shed light on the hidden entrepreneurial aspects of content creation. This SEO-friendly summary delves into their perspectives, emphasizing the skills required and future opportunities for aspiring creators.

Lorenz and Vaynerchuk stress the challenges of content creation, highlighting the significance of storytelling and strategic content development. Learn how analytics, posting times, and feature utilization contribute to crafting successful content in today’s competitive landscape.

The blog also explores Lorenz’s book, “Extremely Online,” unraveling the history of social media and the creator economy. Gain insights into the pitfalls of platforms like Vine and Snapchat and the importance of being consumer-centric and adaptable to industry trends.

Looking ahead, Lorenz predicts a demand for simultaneous ephemeral experiences, hinting at potential opportunities in niche apps and restricted communities. The evolving business models for creators, including alternative revenue streams like merchandise and product lines, are also discussed, offering a glimpse into the future of content monetization.

As the blog touches on the impact of upcoming Hollywood strikes, Lorenz suggests a significant opportunity for internet content creators. Discover whether a career as a creator is more viable today than in the past, with insights on building a successful media business around one’s passion.

Explore the dynamic landscape of content creation, navigate challenges, and seize emerging opportunities with Taylor Lorenz and Gary Vee’s expert perspectives. Dive into the world of strategic content creation and discover the keys to unlocking your potential as a successful content creator.

Read the full interview post by Emily M. Reigart for NAB Amplify HERE


Burchard Scholars gather to network, connect, and learn

Burchard Scholars gather to network, connect, and learn

The Burchard Scholars Program pairs expert faculty with promising MIT sophomores and juniors who have demonstrated excellence in the humanities, arts, or social sciences. Launched in 1986, the program continues to demonstrate the importance of an integrated approach to scholarship and education. 

Administered by the School of Humanities, Arts, and Social Sciences (SHASS), the program features a series of dinner discussions between student participants and experts and thought leaders from across SHASS disciplines. The scholars, with the support of guest speakers and faculty fellows, develop respectful and adaptable approaches to engaging in complex intellectual discussions. The program is named in honor of John Ely Burchard, former dean of SHASS.

MIT students chosen to be Burchard Scholars are consistently among finalists for RhodesMarshall, and other major scholarships and fellowships.

About 35 MIT undergraduates are selected each year for the competitive program. Each cohort of scholars participate for one calendar year, from February through December.

Willow Huang, a biological engineering major, just wrapped a year as a Burchard Scholar, and calls it a valuable experience. “I’m glad I applied,” she says. “We had thought-provoking talks over the course of the year.” 

Huang also praises the program for helping her improve her comprehension and communication skills. 

“These will undoubtedly help me in my career,” she says. “Attaining a level of knowledge in fields like art, history, and literature is an essential part of our education, as it broadens our perspective and helps us make more sense of things like cultural phenomena and political issues.”

Margery Resnick, a professor of literature and women’s and gender studies, is the Burchard Scholars program director. Resnick launched the faculty fellows component of the scholars program 15 years ago.

“These faculty members provide a consistent presence at the Burchards, since they attend the dinners and events and get to know the students well,” she says.

The faculty fellows, chosen by the dean, select the Burchard class and help create a valuable support system for students.

“By the end of the Burchard year, students know a range of faculty, not only the fellows, but also the speakers who come from different programs in the school,” Resnick says. “Most importantly, over the course of the year, students get to know each other and the faculty fellows well.”

The final Burchard Scholars dinner of 2023 was held Nov. 1 at Catalyst restaurant in Cambridge.

Before the dinners, faculty mix with students and come to know each other beyond the classroom. The faculty fellows then sit among the students, and, over dinner, exchange ideas based on the presentation.

“Conversations over dinner are lively, fun and engaging,” Resnick says.

“The scholars represent a diverse swath of studies across the Institute,” she adds, “But all are curious about fields other than their own.” 

Martin Beraja, the dinner’s guest on Nov. 1, is an MIT economist who studies the role of government policy in stabilizing business cycles and responding to the challenges posed by new digital and automation technologies. He presented “Artificial Intelligence and Governments: The Good, The Bad, and The Ugly” during the Burchard Scholars dinner.

The variety of presentation topics is a highlight for students chosen to be part of this year’s Burchard Scholars class.

“We’ll move our world forward by combining disciplines, not by staying in silos,” math and computer science major Laker Newhouse said after the dinner. “With highly capable AI on the horizon, it is important to build diverse, broad coalitions to secure a bright future.”

Benjamin Lou, a double major in math and physics and a philosophy minor, speaks highly of the opportunity to explore ideas outside his academic area. “Burchard shows other SHASS disciplines are valuable,” he notes.

Senior Iana Ferguson, a physics major, enjoyed this year’s dinner series. “It’s a setting where you hear topics you wouldn’t otherwise get,” she says. “Connecting disciplines has value outside physics.”