ReversingLabs: Preventing derailments of the software supply chain

An Intellyx Brain Candy Brief

With ransomware attacks and cyber-sabotage still on the rise, several cybersecurity players are rushing to address weak links in the software supply chain. That’s OK with ReversingLabs, as they have a specific set of capabilities for spotting suspicious changes within the software delivery pipeline for a lot of those vulnerability-oriented vendors as well as business customers.

Security operations-oriented tools may be great for threat detection and hunting down CVEs across production servers—but they don’t really address the DevOps lifecycle, where developers and architects package up the SBOM (software bill of materials). ReversingLabs provides deep inspection of compiled binaries and source packages from repositories, looking for hidden signs of tampering or manipulation that are not obvious to security scans.

Some market education will be required to help companies mature the practice of software supply chain security (SSCS), so developers and SecOps teams can work together to protect delivered binaries, which are the favorite target of hackers. This SSCS platform unpacks software in order to unwind the kill chain at its roots in procured applications, downloaded packages and custom-built code from within a variety of sources.

 

Copyright ©2023 Intellyx LLC. Intellyx is an industry analysis and advisory firm focused on enterprise digital transformation. Covering every angle of enterprise IT from mainframes to artificial intelligence, our broad focus across technologies allows business executives and IT professionals to connect the dots among disruptive trends. As of the time of writing, ReversingLabs is not an Intellyx customer. No AI was used to write this article. To be considered for a Brain Candy article, email us at pr@intellyx.com.

SHARE THIS:

Principal Analyst & CMO, Intellyx. Twitter: @bluefug