Securing the Software Supply Chain by Enterprise Strategy Group (ESG)

Analyst Report by Enterprise Strategy Group

According to ESG*, the overwhelming majority of organizations (91%) have experienced a software supply chain incident in the past 12 months. The most common security incidents over this period were:

  • Zero-day exploits on vulnerabilities within third-party code (41%)
  • Misconfigured cloud service exploits (40%)
  • Vulnerability in open-source software/container images (40%)
  • Secrets/token/passwords stolen from code repositories (37%)
  • API data breaches in third-party software and code (35%)

We believe this report will help you understand the following:

  • Growing complexity of the modern software supply chains.
  • Regulatory pressure and need for Software Bill of Materials (SBOM).
  • Security impact of third-party APIs, cloud services, and code repos.
  • Security tools most orgs will apply in the next 12-18 months.

Data Theorem needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

*TechTarget’s Enterprise Strategy Group (ESG) is an integrated technology analysis, research, and strategy firm providing market intelligence, actionable insight, and go-to-market content services to the global technology community.