Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Securing Tech Product Supply Chain Is No Easy Task

    Written by

    Robert Lemos
    Published November 29, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Malware and spyware are worries for anyone browsing the less-traveled Internet or wondering whether they should open an attachment from an unknown sender. Yet occasionally, the unwanted programs attempt to hitch a ride on other devices.

      Florida-based network integrator iPower Technologies found one such device. The company, which is creating a video storage system for police departments, connected several manufacturers’ body cameras to its computers.

      Devices from one supplier, Martel Electronics, set off its antivirus systems, iPower said in mid-November. The antivirus scanner flagged Conficker. The 7year-old computer virus had apparently infected multiple cameras from the manufacturer.

      Conficker can be difficult to eradicate, as evidenced by its longevity seven years after the first variant started spreading. If an unprotected system had connected to the Martel device, it would likely have been infected, stated iPower, which worried that the computer systems of Martel’s customers—mainly police departments—may have been infected.

      “As the Internet of Things continues to grow into every device we use in our businesses and home lives each day, it becomes even more important that manufactures have stringent security protocols,” Jarrett Pavao, president of iPower, said in a statement. “If products are being produced in offshore locations, what responsibilities lie with the manufacturer to guarantee our safety?”

      Martel did not return requests for comment, yet what appears to have been an accidental infection of a personal electronic device is less of a concern than the trend among intelligence agencies and criminal groups of implanting malware on devices.

      Documents leaked by former National Security Agency contractor Edward Snowden detailed efforts by the U.S. intelligence agency to intercept shipments of hardware, implanting them with surveillance programs and then re-shipping them to their destination.

      In another attack, a supplier of barcode scanners in China shipped devices to at least eight companies with advanced malware embedded in the products. The attack, detailed by security firm TrapX, appears to be part of China’s government-sponsored industrial espionage operations.

      Whether purposeful attacks or unintended infections, such incidents underscore that suppliers and manufacturers need to do more to guard their customers from cyber-attacks.

      “Clearly, the manufacturers are not doing enough to secure their products,” Carl Wright, general manager of TrapX, told eWEEK. “Attackers do not have to do much work to get on those devices.”

      Wright and other security experts are recommending that businesses take a number of steps to try to prevent new computer and electronic equipment from arriving at their doors infected with malware.

      Take suppliers to task

      The first step for companies is to require that their suppliers follow the same security standards and policies that they do, Wright said. While such efforts can be time consuming, educating suppliers on their customers ‘ product security expectations is a good start.

      Securing Tech Product Supply Chain Is No Easy Task

      Once informed, most manufacturers will make a good faith effort to comply with major clients’ requirements.

      Moreover, suppliers need to understand that security is a required feature of any connected product. While bringing a product to market quickly and with the right features is obviously necessary for success, securing the product and the customer’s data are increasingly critical components of any development effort, he said.

      “The onus is clearly on the manufacturer to put the controls in place to secure the products that they are going to bring to market,” Wright said.

      Build a security process

      Getting security right is not easy, but with so much relying on information technology these days, the suppliers of software and technology need to put greater effort into hardening their devices, Eric Baize, senior director of product security and trusted engineering for EMC Corp. told eWEEK.

      Baize, who chairs the board of the Software Assurance Forum for Excellence in Code (SAFECode), argued that it is time to stop complaining about how tough the task of securing software and devices is, and instead put in the work to lock down the tidal wave of new products.

      “A developer needs to do the right thing,” he says. “If it is difficult, it is likely because you don’t have a software engineering process in place.”

      Manufacturers do not have to take the task on alone, however. Projects—such as SafeCODE’s Principles for Software Assurance Assessment and other efforts, such as the Building Security in Maturity Model (BSIMM) — aim to give companies blueprints for how to ensure that security is built into a business and its products. For many suppliers, this will be new territory, James Lyne, global head of security research at antivirus firm Sophos, told eWEEK.

      “There is a whole industry there that has not suffered like Apple and Microsoft have for the last 20 years, and so have not learned these lessons,” he said.

      Start with training

      Once companies create a process for improving their product security—or as a consumer, checking the security of your suppliers’ products—training, and retraining can help instill the security ethic into the developers’ way of working, said SAFECode’s Baize.

      “To solve software security problems we are facing across the board, we need developers to be trained on software security,” he said.

      In the end, however, doing everything right is still no guarantee that cyber-criminals won’t find a way to compromise software or to exploit a hardware system, Baize said.

      “Sometimes software security is like guessing someone life’s expectancy,” he said. “It is very difficult and challenging, and it is based on a very holistic process—even if you do everything right, there will always be a chance that someone can exploit a vulnerability in the software.”

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×