www.embedded.com Open in urlscan Pro
192.0.66.24  Public Scan

Submitted URL: https://aspen.omeclk.com/portal/wts/uemcnrmfw0vaegwF6qj0gCD6jS|sfMm|BEOfswnTPFRd
Effective URL: https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=l...
Submission: On March 15 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.embedded.com/

<form role="search" method="get" class="search-form" action="https://www.embedded.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Name: signInFormPOST https://aspencore.us.janraincapture.com/widget/traditional_signin.jsonp

<form id="capture_signIn_signInForm" name="signInForm" data-capturefield="signInForm" action="https://aspencore.us.janraincapture.com/widget/traditional_signin.jsonp" class="capture_form capture_signInForm" method="POST" novalidate="novalidate"
  data-transactionid="ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" target="captureIFrame_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" accept-charset="UTF-8" next="{&quot;noop&quot;:&quot;&quot;}">
  <div id="capture_signIn_signInForm_defaultSavedProfileMessage"></div>
  <div id="capture_signIn_signInForm_errorMessages"></div><input id="capture_signIn_utf8" data-capturefield="undefined" value="✓" type="hidden" class="capture_utf8" name="utf8"><input
    id="capture_signIn_screen_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="signIn" type="hidden" class="capture_screen_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="capture_screen"><input
    id="capture_signIn_js_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="d445bf4" type="hidden" class="capture_js_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="js_version"><input
    id="capture_signIn_transactionId_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" type="hidden" class="capture_transactionId_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j"
    name="capture_transactionId"><input id="capture_signIn_form_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="signInForm" type="hidden" class="capture_form_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="form"><input
    id="capture_signIn_flow_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="aspencore" type="hidden" class="capture_flow_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="flow"><input
    id="capture_signIn_client_id_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="xpjt4frc5w2p8szh9dkum6ypas2fyzq3" type="hidden" class="capture_client_id_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="client_id"><input
    id="capture_signIn_redirect_uri_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="https://www.embedded.com/wp-admin/admin-ajax.php?action=janrain_capture_redirect_uri" type="hidden"
    class="capture_redirect_uri_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="redirect_uri"><input id="capture_signIn_response_type_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="code" type="hidden"
    class="capture_response_type_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="response_type"><input id="capture_signIn_flow_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="20200624235129666868" type="hidden"
    class="capture_flow_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="flow_version"><input id="capture_signIn_settings_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="" type="hidden"
    class="capture_settings_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="settings_version"><input id="capture_signIn_locale_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="en-US" type="hidden"
    class="capture_locale_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="locale"><input id="capture_signIn_recaptcha_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="1" type="hidden"
    class="capture_recaptcha_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="recaptchaVersion">
  <div id="capture_signIn_form_item_signInEmailAddress" class="capture_form_item capture_email capture_form_item_signInEmailAddress" data-capturefield="undefined"><label for="capture_signIn_signInEmailAddress">Email Address</label><input
      id="capture_signIn_signInEmailAddress" data-capturefield="signInEmailAddress" value="" type="email" class="capture_signInEmailAddress capture_required capture_text_input" placeholder="Email Address" name="signInEmailAddress">
    <div class="capture_tip" style="display:none;"></div>
    <div class="capture_tip_validating" data-elementname="signInEmailAddress">Validating</div>
    <div class="capture_tip_error" data-elementname="signInEmailAddress"></div>
  </div>
  <div id="capture_signIn_form_item_currentPassword" class="capture_form_item capture_password capture_form_item_currentPassword" data-capturefield="undefined"><label for="capture_signIn_currentPassword">Password</label><input
      id="capture_signIn_currentPassword" data-capturefield="currentPassword" value="" type="password" class="capture_currentPassword capture_required capture_text_input" placeholder="Password" name="currentPassword">
    <div class="capture_tip" style="display:none;"></div>
    <div class="capture_tip_validating" data-elementname="currentPassword">Validating</div>
    <div class="capture_tip_error" data-elementname="currentPassword"></div>
  </div>
  <div class="capture_form_item">
    <a href="#" data-capturescreen="forgotPassword">Forgot your password?</a>
  </div>
  <div class="capture_rightText">
    <button class="capture_secondary capture_btn capture_primary" type="submit"><span class="janrain-icon-16 janrain-icon-key"></span> Sign In</button>
    <a href="#" id="capture_signIn_createAccountButton" data-capturescreen="traditionalRegistration" class="capture_secondary capture_createAccountButton capture_btn capture_primary">Create Account</a>
    <div class="serviceMarks"> Powered by Janrain <div id="adfdcb81-3fcc-4e89-807b-a54a89fab74d">
        <script type="text/javascript" src="//privacy-policy.truste.com/privacy-seal/Janrain,-Inc-/asc?rid=adfdcb81-3fcc-4e89-807b-a54a89fab74d"></script>
        <a href="//privacy.truste.com/privacy-seal/Janrain,-Inc-/validation?rid=1b233149-fc3b-4e69-957a-ca7677ee4787" title="TRUSTe Privacy, Trusted Cloud, European Safe Harbor certification" target="_blank"><img style="border: none" src="//privacy-policy.truste.com/privacy-seal/Janrain,-Inc-/seal?rid=7bc0f34d-9cf2-427d-af9e-15e2fc354825" alt="TRUSTe European Safe Harbor certification"></a>
      </div>
    </div>
  </div>
</form>

Text Content

Skip to content

Embedded.com

Primary Menu
 * Embedded Focus
   * Hardware
     * Boards & Modules
     * Chips & Components
     * Components
     * Connectivity
     * Coprocessors
     * Displays
     * Electromechanical
     * Memory / Storage
     * Motors
     * Optoelectronics
     * Sensors
   * Software
     * EDA
     * Operating Systems
     * Source Code
   * Design
     * Integration
     * IoT
     * Performance
     * Security
   * Development
     * Design Methods
     * Solutions
     * Manufacturing
     * Supply Chain
     * Test & Measurement
     * Tools
     * Tools & Software
   * Industry
     * Automotive
     * Consumer
     * Medical
   * Trends
     * Advanced Technology
     * Applications
     * Industry
     * Profession
   * Communications
 * News
 * About us
   * Contact Us
   * Editorial Contributions Guide
 * Subscribe
 * Login/Register


Search for:

   
   
 * Home
 * Blog
 * Top three tips for ensuring software supply chain security

 * Blog


TOP THREE TIPS FOR ENSURING SOFTWARE SUPPLY CHAIN SECURITY

March 11, 2022 Mark Hermeling

To avoid sacrificing security, organizations are increasingly relying on
technologies that can generate a software bill of materials (SBOM) that catalogs
the contents of a software application and any associated vulnerabilities they
contain.


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * More
 * 

 * Reddit
 * Tumblr
 * 
 * Pinterest
 * WhatsApp
 * 
 * Skype
 * Pocket
 * 
 * Telegram
 * 



At a time when “software supply chain attack” has become a household phrase, the
recent vulnerability discovered in the Apache Log4J has delivered a wake-up call
to both developers and software consumers: the days of blindly trusting
third-party software are over.

The vulnerability in Log4J, which is used in applications ranging from Minecraft
to infrastructure servers running Apple’s iCloud and Amazon Web Services, allows
attackers to take control of devices running certain versions of this logging
utility. This is the latest in a series of software supply chain attacks
including SolarWinds, REvil, and Urgent/11.

In the face of these security threats, developers are continually pressed to
deliver applications with speed and efficiency which leads to more use of
third-party code and open-source libraries such as Log4J. To avoid sacrificing
security, organizations are increasingly relying on technologies that can
generate a software bill of materials (SBOM) that catalogs the contents of a
software application and any associated vulnerabilities they contain.



Like any bill of materials in the enterprise, the SBOM defines the components of
the finished product, so if a problem is detected, the root cause can be
remediated while minimizing disruption. SBOMs are recognized as the foundation
of software supply chain security; they allow developers to build more secure
applications, provide security teams with threat intelligence and enable IT
departments to maintain more resilient environments.

The three ‘Ds’ of SBOMs

SBOMs provide valuable insights at three different stages of the software
development life cycle (SDLC) – in development, in delivery, and in deployment,
as described below.

Develop: building programs from scratch is expensive, time-consuming and simply
impractical for organizations that have to move at the speed of business and on
a budget. In the past five years, the use of in-house developed code for IoT
projects has shrunk to 50% and there’s no reason to think it will not continue
to drop further.

Percentage software code in final design. (Source: VDC Research)

Developers must use third-party and open-source components to keep up, and while
integrating testing of components into the workflow is a best practice,
developers often go on trust. Generating an SBOM during this stage gives
development teams more visibility into these components, so they can spot any
known (N-day) or Zero-day vulnerabilities that may be lurking, and make sure
they are using licensed and updated versions of the program.

Regularly analyzing components and generating SBOMs can give development teams
the confidence of knowing that they are meeting quality and security standards,
while enabling them to proactively manage their component libraries.

Deliver: the surge in cybercrime seen during the Covid pandemic put a spotlight
on security, so software development teams and vendors are under the gun to
deliver products that meet tougher standards. Too much of the software used
today could be prey to unknown vulnerabilities lurking in its third-party code,
so new products need to be checked thoroughly to meet quality assurance
standards. When Osterman Research analyzed commercial off-the-shelf software, it
found all programs had open-source components and vulnerabilities; 85% had
critical vulnerabilities in their open source components.

Before release and deployment, compiled software should be run through a
security assurance check to produce an SBOM. At this stage, the scan can
identify the use of open source and check for any vulnerabilities that need to
be fixed or mitigated. This is a key step to ensure that software released to
the market is as secure as possible and free of known vulnerabilities, and it’s
only a matter of time before it’s a requirement across the board.

The 2021 Presidential Cybersecurity Executive Order issued in response to recent
supply chain cyberattacks singled out SBOMs as an effective cybersecurity tool.
The order mandates that ultimately SBOMs for software vendors working with the
Federal government will need to be included as part of the best-practices
guidelines it would recommend to all enterprises, via the National Institute for
Standards and Technology of the Commerce Department. Meanwhile, a number of
industries have begun requiring SBOMs when delivering critical products such as
medical devices and infrastructure controls.

Deploy: with everything from office printers to critical systems now connected
via the internet of things (IoT), there is a much greater attack surface for
finding and exploiting vulnerabilities. As more processes get digitized,
companies are devoting increasing budgets to the software necessary to run them;
Gartner has forecast spending on enterprise software will be near $670 billion
in 2022, up 11.5% annually.



Software developers and vendors are improving practices for delivering secure
software, but enterprise cybersecurity teams are ultimately responsible for
ensuring commercial software being deployed is safe. They must trust, but
verify, and generate their own SBOMs.

By analyzing purchased software, information security teams can get visibility
into the software their organization is either using already or considering.
This can help them improve their security posture, make more intelligent
decisions and speed up threat response if another vulnerability such as Log4j
appears.

Fortunately, creating SBOMs is within reach of virtually any organization thanks
to software composition analysis (SCA) technology. These tools can generate an
SBOM through either source code or binary analysis. Binary SCA tools analyze
compiled code, the actual finished software that is being delivered and deployed
by organizations. This gives them an advantage because they can run without
access to the source code and scan software components, libraries and packages
within applications to generate an SBOM.

With the frequency and sophistication of supply chain attacks on the rise, the
value SBOMs provide cannot be underestimated when it comes to identifying and
mitigating security risks in software that organizations develop, deliver or
deploy.

--------------------------------------------------------------------------------



Mark Hermeling is senior director of product marketing for GrammaTech, with more
than 20 years of experience in software development tooling, operating systems,
virtualization, and networking technology in safe and secure, embedded and
real-time systems. He has worked on projects building automotive, networking,
aerospace and defense and industrial devices in North America, Europe and Asia.
Mark also worked for Wind River Systems (an Intel Corporation subsidiary),
Zeligsoft and IBM Rational.

--------------------------------------------------------------------------------

Related Content:

 * Software quality demands both static code analysis and dynamic testing
 * Selecting the right software defined radio solution for your application
 * Software quality: Balancing risk and cost


SHARE THIS:

 * Twitter
 * Facebook
 * LinkedIn
 * More
 * 

 * Reddit
 * Tumblr
 * 
 * Pinterest
 * WhatsApp
 * 
 * Skype
 * Pocket
 * 
 * Telegram
 * 


Tags: Tools & Software


CONTINUE READING

Previous Shifting to a zero trust security model
Next Four top data-integration challenges facing manufacturers


LEAVE A REPLY CANCEL REPLY

You must Sign in or Register to post a comment.

This site uses Akismet to reduce spam. Learn how your comment data is processed.


LOOKING FOR
DATASHEETS ?





YOU MAY HAVE MISSED

 * Blog


FOUR TOP DATA-INTEGRATION CHALLENGES FACING MANUFACTURERS

March 15, 2022 Bryan Christiansen
 * News


ALPHAWAVE IP BUYS OPENFIVE TO TAP CHIPLET AND RISC-V DEMAND

March 14, 2022 Nitin Dahad
 * Blog


TOP THREE TIPS FOR ENSURING SOFTWARE SUPPLY CHAIN SECURITY

March 11, 2022 Mark Hermeling
 * News


EMBEDDED NEWS: ADDRESSING SECURITY VULNERABILITIES, PLUS NEW PRODUCTS

March 11, 2022 Nitin Dahad
 * News


60 GHZ RADAR TECH ADDS SLEEP MONITORING TO SMART HOME DEVICES

March 11, 2022 Nitin Dahad
Aspencore Network
Products:
 * Electronic Products
 * Datasheets.com
 * TechOnline

News & Analysis:
 * EE Times
 * EE Times Europe
 * Power Electronics News
 * Elektroda.pl

Design:
 * EDN
 * Electroschematics
 * Electronics-Tutorials
 * Planet Analog
 * Embedded
 * Electronics Know How

Tools:
 * EEWEB
 * PartSim
 * Product Advisor
 * Schematics.com
 * Schematics.io
 * Engage

Global Network
 * EE Times Asia
 * EE Times China
 * EE Times India
 * EE Times Taiwan
 * EE Times Japan
 * EDN Asia
 * EDN Taiwan
 * ESM China
 * EDN China
 * EDN Japan

For Advertisers
 * Contact Sales
 * Media Guide Request

Connect with us
   
 * 
   Facebook
   
 * 
   Twitter
   
 * 
   LinkedIn
   
 * 
   Youtube


Copyright © All rights reserved. | Embedded by AspenCore.
 * Privacy Policy
 * Terms of Use
 * Contact Us
 * California Do Not Sell
 * Login/Register

We use cookies on our website to give you the most relevant experience by
remembering your preferences and repeat visits. By clicking “Accept All”, you
consent to the use of ALL the cookies. However, you may visit "Cookie Settings"
to provide a controlled consent.
Cookie SettingsAccept All
Manage consent
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these, the cookies that are categorized as necessary are
stored on your browser as they are essential for the working of basic
functionalities of the ...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
These cookies ensure basic functionalities and security features of the website,
anonymously.

CookieDurationDescriptioncookielawinfo-checkbox-analytics11 monthsThis cookie is
set by GDPR Cookie Consent plugin. The cookie is used to store the user consent
for the cookies in the category "Analytics".cookielawinfo-checkbox-functional11
monthsThe cookie is set by GDPR cookie consent to record the user consent for
the cookies in the category "Functional".cookielawinfo-checkbox-necessary11
monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to
store the user consent for the cookies in the category
"Necessary".cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR
Cookie Consent plugin. The cookie is used to store the user consent for the
cookies in the category "Other.cookielawinfo-checkbox-performance11 monthsThis
cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the
user consent for the cookies in the category
"Performance".viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie
Consent plugin and is used to store whether or not user has consented to the use
of cookies. It does not store any personal data.

Functional
Functional
Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.
Performance
Performance
Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.
Analytics
Analytics
Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and
marketing campaigns. These cookies track visitors across websites and collect
information to provide customized ads.
Others
Others
Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.
SAVE & ACCEPT




SIGN IN


WELCOME BACK, {* WELCOMENAME *}!

{* loginWidget *}
Use another account


SIGN IN


WELCOME BACK

{* #signInForm *} {* signInEmailAddress *} {* currentPassword *}
Sign In
{* /signInForm *}
Use another account


ACCOUNT DEACTIVATED

Your account has been deactivated.


ACCOUNT REACTIVATION FAILED

Sorry, we could not verify that email address.


ACCOUNT ACTIVATED

Your account has been reactivated.

Sign in


EMAIL VERIFICATION REQUIRED

You must verify your email address before signing in. Check your email for your
verification email, or enter your email address in the form below to resend the
email.

{* #resendVerificationForm *} {* signInEmailAddress *}

{* /resendVerificationForm *}


ALMOST DONE


PLEASE CONFIRM THE INFORMATION BELOW BEFORE SIGNING IN.

{* #socialRegistrationForm *} {* firstName *} {* lastName *} {* displayName *}
{* emailAddress *} By clicking "Sign In", you confirm that you accept our terms
of service and have read and understand privacy policy.
{* backButton *}

{* /socialRegistrationForm *}


ALMOST DONE

Please confirm the information below before signing in. Already have an account?
Sign In.

{* #registrationForm *} {* emailAddress *} {* newPassword *} {*
newPasswordConfirm *} {* displayName *} {* jobTitle *} {* firstName *} {*
lastName *} {* ednembJobfunction *} {* jobFunctionOther *} {* ednembIndustry *}
{* industryOther *} {* linkedinProfileName *} {* twitterProfileName *} {*
companyName *} {* addressStreetAddress1 *} {* addressStreetAddress2 *} {*
addressCountry *} {* addressState *} {* addressStateText *} {* addressCity *} {*
addressPostalCode *} {* phone *} {* optInRegistration *} {* optAgree *} {*
optShare *} {* applicationAndTech_analog *} {* applicationAndTech_power *} {*
applicationAndTech_memory *} {* applicationAndTech_programmableLogic *} {*
applicationAndTech_computingGraphics *} {* applicationAndTech_entertainment *}
{* applicationAndTech_networking *} {* applicationAndTech_testAndMeasurement *}
{* applicationAndTech_electromechanicalComponents *} {*
applicationAndTech_connectorsInterconnects *} {*
applicationAndTech_rfOrMicrowave *} {*
applicationAndTech_microprocessorsMicrocontrollersSignal *} {*
applicationAndTech_icDesignTools *} {*
applicationAndTech_embeddedDevelopmentTools *} {*
applicationAndTech_controlSystems *} {* applicationAndTech_mobileDevices *} {*
applicationAndTech_safetySecurity *} {* applicationAndTech_passiveComponents *}
By clicking "Create Account", you confirm that you accept our terms of service
and have read and understand privacy policy.
{* backButton *}

{* /registrationForm *}


THANK YOU FOR REGISTERING

We have sent a confirmation email to {* emailAddressData *}. Please check your
email and click on the link to verify your email address.

Close


CREATE NEW PASSWORD


WE'LL SEND YOU A LINK TO CREATE A NEW PASSWORD.

{* #forgotPasswordForm *} {* signInEmailAddress *}
{* backButton *}

{* /forgotPasswordForm *}


CREATE NEW PASSWORD

We've sent an email with instructions to create a new password. Your existing
password has not been changed.

Close
{* mergeAccounts {"custom": true} *}
{| rendered_current_photo |}
{| current_displayName |}
{| current_emailAddress |}

{| foundExistingAccountText |} {| current_emailAddress |}.

{| moreInfoHoverText |}
{| existing_displayName |} - {| existing_provider |} : {| existing_siteName |}
{| existing_createdDate |}
{| moreInfoText |}
{| rendered_existing_provider_photo |}
{| existing_displayName |}
{| existing_provider_emailAddress |}
Created {| existing_createdDate |} at {| existing_siteName |}
{| connectLegacyRadioText |}
{| createRadioText |} {| current_provider |}

Validating

{| connect_button |} {| create_button |}


SIGN IN TO COMPLETE ACCOUNT MERGE

{* #signInForm *} {* signInEmailAddress *} {* currentPassword *}
{* backButton *}
Sign In
{* /signInForm *}


RESEND VERIFICATION EMAIL

Sorry, we could not verify that email address. Enter your email below, and we'll
send you another email.

{* #resendVerificationForm *} {* signInEmailAddress *}

{* /resendVerificationForm *}


VERIFICATION EMAIL SENT



Check your email for a link to verify your email address.

Sign in


EMAIL VERIFIED

Thank you for verifiying your email address.

Sign in


CHANGE PASSWORD

{* #changePasswordFormNoAuth *} {* newPassword *} {* newPasswordConfirm *}

{* /changePasswordFormNoAuth *}


PASSWORD CHANGED

Your password has been successfully updated.

Sign in


CREATE NEW PASSWORD

We didn't recognize that password reset code. Enter your email below, and we'll
send you another email.

{* #resetPasswordForm *} {* signInEmailAddress *}

{* /resetPasswordForm *}


CREATE NEW PASSWORD

We've sent you an email with instructions to create a new password. Your
existing password has not been changed.

Close



 * Facebook
 * Twitter

 * LinkedIn

Social Login by Janrain


Email

Facebook

LinkedIn

Twitter
Social Sharing by Janrain

Share with Your Friends By Email
Email sent
Thanks for sharing with your contacts via email. Share with your other networks
too!

Start Over
Select your contacts
x
+

11
Edit
Done

Close
Done
Selected contacts
x
+

11
Edit
Done

Close
Done
x
+

30
Edit
Done
or browse contacts

and 0 more
x
+
It appears the URL has been modified. Restore?
0
Edit
Done
x
+

-192
Edit
Done

https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=link&utm_medium=EPSNewsPurchasingNow-20220315&oly_enc_id=7898C4385267I9R
undefined
Switch accounts
Sign in to your email providerConnecting to email failed. %TAG%View
Error%GAT%Send email directly using your email client!Send email directly

Share On Your Timeline
Shared on Your Timeline
Thanks for sharing with your friends on Facebook. Share with your other networks
too!

Start Over
x
+

4
Edit
Done
or browse friends

and 0 more
x
+
It appears the URL has been modified. Restore?
0
Edit
Done
x
+
It appears the URL has been modified. Restore?
0
Edit
Done

https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=link&utm_medium=EPSNewsPurchasingNow-20220315&oly_enc_id=7898C4385267I9R
undefined
Switch accounts
Connecting to Facebook failed. %TAG%View Error%GAT%

Share

Connect
Share With Your Connections
Shared to LinkedIn
Thanks for sharing with your connections on LinkedIn. Share with your other
networks too!

Start Over
x
+

4
Edit
Done
or browse connections

and 0 more
x
+
It appears the URL has been modified. Restore?
0
Edit
Done
x
+
It appears the URL has been modified. Restore?
0
Edit
Done

https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=link&utm_medium=EPSNewsPurchasingNow-20220315&oly_enc_id=7898C4385267I9R
undefined
Switch accounts
Sign in to your email providerConnecting to LinkedIn failed. %TAG%View
Error%GAT%Send email directly using your email client!Send email directly

Share

Connect
Tweet To Your Followers
Shared to Twitter
Thanks for sharing with your followers on Twitter. Share with your other
networks too!

Start Over
x
+

4
Edit
Done
or browse followers

and 0 more
x
+
It appears the URL has been modified. Restore?
140
Edit
Done
x
+
URL will be shortened
8
Edit
Done

https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=link&utm_medium=EPSNewsPurchasingNow-20220315&oly_enc_id=7898C4385267I9R
undefined
Switch accounts
Connecting to Twitter failed. %TAG%View Error%GAT%

Share

Connect

X

X


SIGN UP / SIGN IN


WITH A TRADITIONAL ACCOUNT...

Email Address

Validating

Password

Validating

Forgot your password?
Sign In Create Account
Powered by Janrain