{"id":1057,"date":"2024-12-03T23:50:22","date_gmt":"2024-12-03T23:50:22","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1057"},"modified":"2024-12-03T23:50:22","modified_gmt":"2024-12-03T23:50:22","slug":"blackberry-highlights-rising-software-supply-chain-risks-in-malaysia","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1057","title":{"rendered":"BlackBerry Highlights Rising Software Supply Chain Risks in Malaysia"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>In 2024, BlackBerry unveiled <a href=\"https:\/\/csrc.nist.gov\/csrc\/media\/Presentations\/2024\/blackberry-s-state-of-software-supply-chain\/images-media\/20240918_CG%20-%20CP3944%20Software%20supply%20chain%20research%20-%20Global%20final%20results.pdf\" target=\"_blank\" rel=\"noopener\">new proprietary research<\/a>, underscoring the vulnerability of software supply chains in <a href=\"https:\/\/blogs.blackberry.com\/en\/2024\/08\/software-supply-chain-security-malaysia\" target=\"_blank\" rel=\"noopener\">Malaysia<\/a> and around the world.<\/p>\n<p>According to the study, 79% of Malaysian organizations reported cyberattacks or vulnerabilities in their software supply chains during the past 12 months, slightly exceeding the global average of 76%. Alarmingly, 81% of respondents revealed they had discovered unknown members within their software supply chains during this period.<\/p>\n<p>These findings point to the rise in supply chain attacks, targeting vulnerable digital threads that connect millions of organizations.\u00a0 Around the same time this survey was released, <a href=\"https:\/\/www.blackberry.com\/us\/en\/company\/newsroom\/press-releases\/2024\/blackberry-reports-53-percent-increase-in-unique-malware-used-in-cyberattacks\" target=\"_blank\" rel=\"noopener\">BlackBerry\u2019s Global Threat Intelligence Report<\/a> revealed the company detected and stopped an average of 11,500 unique malware samples daily, up 53 percent from the previous reporting period. \u00a0It also said, in the Asia Pacific region, geopolitical tensions continue to influence cyber trends, including rising state-sponsored and financially-motivated cyberattacks on critical infrastructure, supply chains and businesses.<\/p>\n<p>In tandem, Malaysia\u2019s efforts to bolster cybersecurity resilience through initiatives such as the <strong><a href=\"https:\/\/www.nacsa.gov.my\/act854.php\">Cyber Security Act 2024<\/a> (Act 854)<\/strong> and the <strong><a href=\"https:\/\/www.pmo.gov.my\/wp-content\/uploads\/2024\/05\/YAB-PM-Speech-Semicon-SEA-28052024-Final.pdf\">National Semiconductor Strategy<\/a> (NSS)<\/strong>, will help to strengthen overall preparedness and fortify key industries and critical infrastructure. With ambitions for the NSS to establish Malaysia as a global semiconductor hub, it rightly emphasizes secure-by-design principles for Internet of Things (IoT) components and skills development to strengthen the IT supply chain.<\/p>\n<h3 class=\"wp-block-heading\"><strong>The Cost of Insecurity<\/strong><\/h3>\n<p>BlackBerry\u2019s research paints a stark picture of the impact of supply chain breaches. Nearly a third of Malaysian respondents identified operating systems (30%) and IoT components (19%) as their biggest vulnerabilities. The consequences of attacks are severe, including financial losses (71%), reputational damage (66%), and data breaches (59%).<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p class=\"imageCredit\">BlackBerry<\/p>\n<\/div>\n<p>While many organizations prioritize cybersecurity, 38% admitted recovery from supply chain incidents can take up to a month. Christine Gadsby, BlackBerry\u2019s CISO, emphasized that protecting software supply chains requires more than trust.<\/p>\n<p><em>\u201cA comprehensive approach that integrates skilled talent, secure-by-design practices, and modern AI monitoring tools is essential.\u201d<\/em><\/p>\n<h3 class=\"wp-block-heading\"><strong>Building Cyber-Resilience in Malaysia<\/strong><\/h3>\n<p>The Cyber Security Act 2024 mandates more rigorous standards for securing Malaysia\u2019s National Critical Information Infrastructure, which is seen as crucial to the nation\u2019s economic future and attracting foreign investment.<\/p>\n<p>Dr. Megat Zuhairy bin Megat Tajuddin, CEO of NACSA, highlighted the importance of robust supply chain security for Malaysia\u2019s global ambitions in sectors like semiconductors and Artificial Intelligence (AI). <\/p>\n<p><em>\u201cBy improving compliance, adopting cutting-edge technologies, and training a skilled workforce, we can protect key infrastructure, boost economic confidence, and strengthen international trade partnerships.\u201d<\/em><\/p>\n<h3 class=\"wp-block-heading\"><strong>Challenges and Opportunities Ahead<\/strong><\/h3>\n<p>Despite significant progress in cybersecurity regulation, skills development and other initiatives, the research revealed areas for improvement. Malaysian organizations demonstrate high confidence in their supply chain partners\u2019 cybersecurity measures, with 95% believing their suppliers can prevent vulnerabilities. However, only 18% of companies request ongoing evidence of compliance with security frameworks post-onboarding.<\/p>\n<p>Moreover, regular software inventory audits are hindered by barriers such as limited technical understanding (58%), inadequate tools (44%), and a lack of skilled talent (40%). To address these challenges, 77% of respondents expressed interest in adopting tools that enhance visibility into software supply chains and automate vulnerability tracking.<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p class=\"imageCredit\">BlackBerry<\/p>\n<\/div>\n<p>Gadsby concluded by advocating for the integration of <strong>Managed Detection and Response (MDR)<\/strong> technologies.<\/p>\n<p><em>\u201cThese solutions provide 24\/7 threat monitoring, enabling resource-constrained IT teams to mitigate emerging risks effectively.\u201d<\/em><\/p>\n<p>The BlackBerry Global Threat Report (<a href=\"https:\/\/www.blackberry.com\/us\/en\/pdfviewer?file=\/content\/dam\/bbcomv4\/blackberry-com\/en\/solutions\/threat-intelligence\/threat-report\/sept2024\/Global-Threat-Intelligence-Report_Sept-2024.pdf\" target=\"_blank\" rel=\"noopener\">September<\/a>) also showed that organisations are increasingly targeted by a plethora of threats such as cyber espionage, eavesdropping, ransomware and phishing attacks. To enhance the resilience of supply chains, organisations in Malaysia should heighten their vigilance and protections cross all threat vectors, <strong>including <a href=\"https:\/\/www.blackberry.com\/us\/en\/solutions\/secure-communication#top\" target=\"_blank\" rel=\"noopener\">devices and communications<\/a><\/strong>, particularly following <a href=\"https:\/\/blogs.blackberry.com\/en\/2024\/10\/telecommunication-network-breach-security-gaps\" target=\"_blank\" rel=\"noopener\">recent espionage campaigns infiltrating sovereign telecoms operators<\/a> in the United States and \u2018Lightspy\u2019 mobile espionage actors.<\/p>\n<h3 class=\"wp-block-heading\"><strong>A Future-Ready Cybersecurity Strategy<\/strong><\/h3>\n<p>As Malaysia strengthens its cybersecurity posture nationally, BlackBerry\u2019s research highlights the urgency of secure-by-design practices and cross-sector collaboration.<\/p>\n<p>While these future-focused government policies are an important first step, they cannot thrive without the right training initiatives for a modern cybersecurity workforce. That is why BlackBerry is actively supporting these efforts through its partnership with the Malaysian Communications &amp; Multimedia Commission (MCMC) in operating the <strong>Cybersecurity Center of Excellence (CCoE) in Cyberjaya<\/strong>.<\/p>\n<p>The CCoE is the first of its kind in the region, offering a range of initiatives to help build an ecosystem of cybersecurity training both nationwide and regionally. This will in turn help grow the workforce, fill much needed roles and help to safeguard against cyberattacks targeting Malaysian government institutions, businesses and infrastructure.<\/p>\n<p>To see the full software supply chain study in APAC, please visit <a href=\"https:\/\/www.blackberry.com\/content\/dam\/blackberry-com\/media-gallery\/pdf\/CP3944-Software_supply_chain_research-APAC.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.\u00a0 To access the full <a href=\"https:\/\/www.blackberry.com\/us\/en\/company\/newsroom\/press-releases\/2024\/software-supply-chain-attack-have-increased-financial-and-reputational-impacts-on-companies-globally-new-blackberry-research-reveals\" target=\"_blank\" rel=\"noopener\">global report<\/a>, visit here.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In 2024, BlackBerry unveiled new proprietary research, underscoring the vulnerability of software supply chains in Malaysia and around the world. According to the study, 79% of Malaysian organizations reported cyberattacks or vulnerabilities in their software supply chains during the past 12 months, slightly exceeding the global average of 76%. Alarmingly, 81% of respondents revealed they [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1058,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1057"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1057"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1057\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1058"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}