www.embedded.com
Open in
urlscan Pro
192.0.66.24
Public Scan
Submitted URL: https://aspen.omeclk.com/portal/wts/uemcnrmfw0vaegwF6qj0gCD6jS|sfMm|BEOfswnTPFRd
Effective URL: https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=l...
Submission: On March 15 via api from US — Scanned from DE
Effective URL: https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=l...
Submission: On March 15 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://www.embedded.com/
<form role="search" method="get" class="search-form" action="https://www.embedded.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
Name: signInForm — POST https://aspencore.us.janraincapture.com/widget/traditional_signin.jsonp
<form id="capture_signIn_signInForm" name="signInForm" data-capturefield="signInForm" action="https://aspencore.us.janraincapture.com/widget/traditional_signin.jsonp" class="capture_form capture_signInForm" method="POST" novalidate="novalidate"
data-transactionid="ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" target="captureIFrame_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" accept-charset="UTF-8" next="{"noop":""}">
<div id="capture_signIn_signInForm_defaultSavedProfileMessage"></div>
<div id="capture_signIn_signInForm_errorMessages"></div><input id="capture_signIn_utf8" data-capturefield="undefined" value="✓" type="hidden" class="capture_utf8" name="utf8"><input
id="capture_signIn_screen_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="signIn" type="hidden" class="capture_screen_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="capture_screen"><input
id="capture_signIn_js_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="d445bf4" type="hidden" class="capture_js_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="js_version"><input
id="capture_signIn_transactionId_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" type="hidden" class="capture_transactionId_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j"
name="capture_transactionId"><input id="capture_signIn_form_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="signInForm" type="hidden" class="capture_form_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="form"><input
id="capture_signIn_flow_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="aspencore" type="hidden" class="capture_flow_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="flow"><input
id="capture_signIn_client_id_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="xpjt4frc5w2p8szh9dkum6ypas2fyzq3" type="hidden" class="capture_client_id_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="client_id"><input
id="capture_signIn_redirect_uri_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="https://www.embedded.com/wp-admin/admin-ajax.php?action=janrain_capture_redirect_uri" type="hidden"
class="capture_redirect_uri_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="redirect_uri"><input id="capture_signIn_response_type_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="code" type="hidden"
class="capture_response_type_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="response_type"><input id="capture_signIn_flow_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="20200624235129666868" type="hidden"
class="capture_flow_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="flow_version"><input id="capture_signIn_settings_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="" type="hidden"
class="capture_settings_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="settings_version"><input id="capture_signIn_locale_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="en-US" type="hidden"
class="capture_locale_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="locale"><input id="capture_signIn_recaptcha_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" data-capturefield="undefined" value="1" type="hidden"
class="capture_recaptcha_version_ei3nvrjb0ivn4s76chipq1nkex6hcc2vz0zxp65j" name="recaptchaVersion">
<div id="capture_signIn_form_item_signInEmailAddress" class="capture_form_item capture_email capture_form_item_signInEmailAddress" data-capturefield="undefined"><label for="capture_signIn_signInEmailAddress">Email Address</label><input
id="capture_signIn_signInEmailAddress" data-capturefield="signInEmailAddress" value="" type="email" class="capture_signInEmailAddress capture_required capture_text_input" placeholder="Email Address" name="signInEmailAddress">
<div class="capture_tip" style="display:none;"></div>
<div class="capture_tip_validating" data-elementname="signInEmailAddress">Validating</div>
<div class="capture_tip_error" data-elementname="signInEmailAddress"></div>
</div>
<div id="capture_signIn_form_item_currentPassword" class="capture_form_item capture_password capture_form_item_currentPassword" data-capturefield="undefined"><label for="capture_signIn_currentPassword">Password</label><input
id="capture_signIn_currentPassword" data-capturefield="currentPassword" value="" type="password" class="capture_currentPassword capture_required capture_text_input" placeholder="Password" name="currentPassword">
<div class="capture_tip" style="display:none;"></div>
<div class="capture_tip_validating" data-elementname="currentPassword">Validating</div>
<div class="capture_tip_error" data-elementname="currentPassword"></div>
</div>
<div class="capture_form_item">
<a href="#" data-capturescreen="forgotPassword">Forgot your password?</a>
</div>
<div class="capture_rightText">
<button class="capture_secondary capture_btn capture_primary" type="submit"><span class="janrain-icon-16 janrain-icon-key"></span> Sign In</button>
<a href="#" id="capture_signIn_createAccountButton" data-capturescreen="traditionalRegistration" class="capture_secondary capture_createAccountButton capture_btn capture_primary">Create Account</a>
<div class="serviceMarks"> Powered by Janrain <div id="adfdcb81-3fcc-4e89-807b-a54a89fab74d">
<script type="text/javascript" src="//privacy-policy.truste.com/privacy-seal/Janrain,-Inc-/asc?rid=adfdcb81-3fcc-4e89-807b-a54a89fab74d"></script>
<a href="//privacy.truste.com/privacy-seal/Janrain,-Inc-/validation?rid=1b233149-fc3b-4e69-957a-ca7677ee4787" title="TRUSTe Privacy, Trusted Cloud, European Safe Harbor certification" target="_blank"><img style="border: none" src="//privacy-policy.truste.com/privacy-seal/Janrain,-Inc-/seal?rid=7bc0f34d-9cf2-427d-af9e-15e2fc354825" alt="TRUSTe European Safe Harbor certification"></a>
</div>
</div>
</div>
</form>
Text Content
Skip to content Embedded.com Primary Menu * Embedded Focus * Hardware * Boards & Modules * Chips & Components * Components * Connectivity * Coprocessors * Displays * Electromechanical * Memory / Storage * Motors * Optoelectronics * Sensors * Software * EDA * Operating Systems * Source Code * Design * Integration * IoT * Performance * Security * Development * Design Methods * Solutions * Manufacturing * Supply Chain * Test & Measurement * Tools * Tools & Software * Industry * Automotive * Consumer * Medical * Trends * Advanced Technology * Applications * Industry * Profession * Communications * News * About us * Contact Us * Editorial Contributions Guide * Subscribe * Login/Register Search for: * Home * Blog * Top three tips for ensuring software supply chain security * Blog TOP THREE TIPS FOR ENSURING SOFTWARE SUPPLY CHAIN SECURITY March 11, 2022 Mark Hermeling To avoid sacrificing security, organizations are increasingly relying on technologies that can generate a software bill of materials (SBOM) that catalogs the contents of a software application and any associated vulnerabilities they contain. SHARE THIS: * Twitter * Facebook * LinkedIn * More * * Reddit * Tumblr * * Pinterest * WhatsApp * * Skype * Pocket * * Telegram * At a time when “software supply chain attack” has become a household phrase, the recent vulnerability discovered in the Apache Log4J has delivered a wake-up call to both developers and software consumers: the days of blindly trusting third-party software are over. The vulnerability in Log4J, which is used in applications ranging from Minecraft to infrastructure servers running Apple’s iCloud and Amazon Web Services, allows attackers to take control of devices running certain versions of this logging utility. This is the latest in a series of software supply chain attacks including SolarWinds, REvil, and Urgent/11. In the face of these security threats, developers are continually pressed to deliver applications with speed and efficiency which leads to more use of third-party code and open-source libraries such as Log4J. To avoid sacrificing security, organizations are increasingly relying on technologies that can generate a software bill of materials (SBOM) that catalogs the contents of a software application and any associated vulnerabilities they contain. Like any bill of materials in the enterprise, the SBOM defines the components of the finished product, so if a problem is detected, the root cause can be remediated while minimizing disruption. SBOMs are recognized as the foundation of software supply chain security; they allow developers to build more secure applications, provide security teams with threat intelligence and enable IT departments to maintain more resilient environments. The three ‘Ds’ of SBOMs SBOMs provide valuable insights at three different stages of the software development life cycle (SDLC) – in development, in delivery, and in deployment, as described below. Develop: building programs from scratch is expensive, time-consuming and simply impractical for organizations that have to move at the speed of business and on a budget. In the past five years, the use of in-house developed code for IoT projects has shrunk to 50% and there’s no reason to think it will not continue to drop further. Percentage software code in final design. (Source: VDC Research) Developers must use third-party and open-source components to keep up, and while integrating testing of components into the workflow is a best practice, developers often go on trust. Generating an SBOM during this stage gives development teams more visibility into these components, so they can spot any known (N-day) or Zero-day vulnerabilities that may be lurking, and make sure they are using licensed and updated versions of the program. Regularly analyzing components and generating SBOMs can give development teams the confidence of knowing that they are meeting quality and security standards, while enabling them to proactively manage their component libraries. Deliver: the surge in cybercrime seen during the Covid pandemic put a spotlight on security, so software development teams and vendors are under the gun to deliver products that meet tougher standards. Too much of the software used today could be prey to unknown vulnerabilities lurking in its third-party code, so new products need to be checked thoroughly to meet quality assurance standards. When Osterman Research analyzed commercial off-the-shelf software, it found all programs had open-source components and vulnerabilities; 85% had critical vulnerabilities in their open source components. Before release and deployment, compiled software should be run through a security assurance check to produce an SBOM. At this stage, the scan can identify the use of open source and check for any vulnerabilities that need to be fixed or mitigated. This is a key step to ensure that software released to the market is as secure as possible and free of known vulnerabilities, and it’s only a matter of time before it’s a requirement across the board. The 2021 Presidential Cybersecurity Executive Order issued in response to recent supply chain cyberattacks singled out SBOMs as an effective cybersecurity tool. The order mandates that ultimately SBOMs for software vendors working with the Federal government will need to be included as part of the best-practices guidelines it would recommend to all enterprises, via the National Institute for Standards and Technology of the Commerce Department. Meanwhile, a number of industries have begun requiring SBOMs when delivering critical products such as medical devices and infrastructure controls. Deploy: with everything from office printers to critical systems now connected via the internet of things (IoT), there is a much greater attack surface for finding and exploiting vulnerabilities. As more processes get digitized, companies are devoting increasing budgets to the software necessary to run them; Gartner has forecast spending on enterprise software will be near $670 billion in 2022, up 11.5% annually. Software developers and vendors are improving practices for delivering secure software, but enterprise cybersecurity teams are ultimately responsible for ensuring commercial software being deployed is safe. They must trust, but verify, and generate their own SBOMs. By analyzing purchased software, information security teams can get visibility into the software their organization is either using already or considering. This can help them improve their security posture, make more intelligent decisions and speed up threat response if another vulnerability such as Log4j appears. Fortunately, creating SBOMs is within reach of virtually any organization thanks to software composition analysis (SCA) technology. These tools can generate an SBOM through either source code or binary analysis. Binary SCA tools analyze compiled code, the actual finished software that is being delivered and deployed by organizations. This gives them an advantage because they can run without access to the source code and scan software components, libraries and packages within applications to generate an SBOM. With the frequency and sophistication of supply chain attacks on the rise, the value SBOMs provide cannot be underestimated when it comes to identifying and mitigating security risks in software that organizations develop, deliver or deploy. -------------------------------------------------------------------------------- Mark Hermeling is senior director of product marketing for GrammaTech, with more than 20 years of experience in software development tooling, operating systems, virtualization, and networking technology in safe and secure, embedded and real-time systems. He has worked on projects building automotive, networking, aerospace and defense and industrial devices in North America, Europe and Asia. Mark also worked for Wind River Systems (an Intel Corporation subsidiary), Zeligsoft and IBM Rational. -------------------------------------------------------------------------------- Related Content: * Software quality demands both static code analysis and dynamic testing * Selecting the right software defined radio solution for your application * Software quality: Balancing risk and cost SHARE THIS: * Twitter * Facebook * LinkedIn * More * * Reddit * Tumblr * * Pinterest * WhatsApp * * Skype * Pocket * * Telegram * Tags: Tools & Software CONTINUE READING Previous Shifting to a zero trust security model Next Four top data-integration challenges facing manufacturers LEAVE A REPLY CANCEL REPLY You must Sign in or Register to post a comment. This site uses Akismet to reduce spam. Learn how your comment data is processed. LOOKING FOR DATASHEETS ? YOU MAY HAVE MISSED * Blog FOUR TOP DATA-INTEGRATION CHALLENGES FACING MANUFACTURERS March 15, 2022 Bryan Christiansen * News ALPHAWAVE IP BUYS OPENFIVE TO TAP CHIPLET AND RISC-V DEMAND March 14, 2022 Nitin Dahad * Blog TOP THREE TIPS FOR ENSURING SOFTWARE SUPPLY CHAIN SECURITY March 11, 2022 Mark Hermeling * News EMBEDDED NEWS: ADDRESSING SECURITY VULNERABILITIES, PLUS NEW PRODUCTS March 11, 2022 Nitin Dahad * News 60 GHZ RADAR TECH ADDS SLEEP MONITORING TO SMART HOME DEVICES March 11, 2022 Nitin Dahad Aspencore Network Products: * Electronic Products * Datasheets.com * TechOnline News & Analysis: * EE Times * EE Times Europe * Power Electronics News * Elektroda.pl Design: * EDN * Electroschematics * Electronics-Tutorials * Planet Analog * Embedded * Electronics Know How Tools: * EEWEB * PartSim * Product Advisor * Schematics.com * Schematics.io * Engage Global Network * EE Times Asia * EE Times China * EE Times India * EE Times Taiwan * EE Times Japan * EDN Asia * EDN Taiwan * ESM China * EDN China * EDN Japan For Advertisers * Contact Sales * Media Guide Request Connect with us * Facebook * Twitter * LinkedIn * Youtube Copyright © All rights reserved. | Embedded by AspenCore. * Privacy Policy * Terms of Use * Contact Us * California Do Not Sell * Login/Register We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent. Cookie SettingsAccept All Manage consent Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the ... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. CookieDurationDescriptioncookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. Functional Functional Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. Performance Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. Analytics Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Advertisement Advertisement Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads. Others Others Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. SAVE & ACCEPT SIGN IN WELCOME BACK, {* WELCOMENAME *}! {* loginWidget *} Use another account SIGN IN WELCOME BACK {* #signInForm *} {* signInEmailAddress *} {* currentPassword *} Sign In {* /signInForm *} Use another account ACCOUNT DEACTIVATED Your account has been deactivated. ACCOUNT REACTIVATION FAILED Sorry, we could not verify that email address. ACCOUNT ACTIVATED Your account has been reactivated. Sign in EMAIL VERIFICATION REQUIRED You must verify your email address before signing in. Check your email for your verification email, or enter your email address in the form below to resend the email. {* #resendVerificationForm *} {* signInEmailAddress *} {* /resendVerificationForm *} ALMOST DONE PLEASE CONFIRM THE INFORMATION BELOW BEFORE SIGNING IN. {* #socialRegistrationForm *} {* firstName *} {* lastName *} {* displayName *} {* emailAddress *} By clicking "Sign In", you confirm that you accept our terms of service and have read and understand privacy policy. {* backButton *} {* /socialRegistrationForm *} ALMOST DONE Please confirm the information below before signing in. Already have an account? Sign In. {* #registrationForm *} {* emailAddress *} {* newPassword *} {* newPasswordConfirm *} {* displayName *} {* jobTitle *} {* firstName *} {* lastName *} {* ednembJobfunction *} {* jobFunctionOther *} {* ednembIndustry *} {* industryOther *} {* linkedinProfileName *} {* twitterProfileName *} {* companyName *} {* addressStreetAddress1 *} {* addressStreetAddress2 *} {* addressCountry *} {* addressState *} {* addressStateText *} {* addressCity *} {* addressPostalCode *} {* phone *} {* optInRegistration *} {* optAgree *} {* optShare *} {* applicationAndTech_analog *} {* applicationAndTech_power *} {* applicationAndTech_memory *} {* applicationAndTech_programmableLogic *} {* applicationAndTech_computingGraphics *} {* applicationAndTech_entertainment *} {* applicationAndTech_networking *} {* applicationAndTech_testAndMeasurement *} {* applicationAndTech_electromechanicalComponents *} {* applicationAndTech_connectorsInterconnects *} {* applicationAndTech_rfOrMicrowave *} {* applicationAndTech_microprocessorsMicrocontrollersSignal *} {* applicationAndTech_icDesignTools *} {* applicationAndTech_embeddedDevelopmentTools *} {* applicationAndTech_controlSystems *} {* applicationAndTech_mobileDevices *} {* applicationAndTech_safetySecurity *} {* applicationAndTech_passiveComponents *} By clicking "Create Account", you confirm that you accept our terms of service and have read and understand privacy policy. {* backButton *} {* /registrationForm *} THANK YOU FOR REGISTERING We have sent a confirmation email to {* emailAddressData *}. Please check your email and click on the link to verify your email address. Close CREATE NEW PASSWORD WE'LL SEND YOU A LINK TO CREATE A NEW PASSWORD. {* #forgotPasswordForm *} {* signInEmailAddress *} {* backButton *} {* /forgotPasswordForm *} CREATE NEW PASSWORD We've sent an email with instructions to create a new password. Your existing password has not been changed. Close {* mergeAccounts {"custom": true} *} {| rendered_current_photo |} {| current_displayName |} {| current_emailAddress |} {| foundExistingAccountText |} {| current_emailAddress |}. {| moreInfoHoverText |} {| existing_displayName |} - {| existing_provider |} : {| existing_siteName |} {| existing_createdDate |} {| moreInfoText |} {| rendered_existing_provider_photo |} {| existing_displayName |} {| existing_provider_emailAddress |} Created {| existing_createdDate |} at {| existing_siteName |} {| connectLegacyRadioText |} {| createRadioText |} {| current_provider |} Validating {| connect_button |} {| create_button |} SIGN IN TO COMPLETE ACCOUNT MERGE {* #signInForm *} {* signInEmailAddress *} {* currentPassword *} {* backButton *} Sign In {* /signInForm *} RESEND VERIFICATION EMAIL Sorry, we could not verify that email address. Enter your email below, and we'll send you another email. {* #resendVerificationForm *} {* signInEmailAddress *} {* /resendVerificationForm *} VERIFICATION EMAIL SENT Check your email for a link to verify your email address. Sign in EMAIL VERIFIED Thank you for verifiying your email address. Sign in CHANGE PASSWORD {* #changePasswordFormNoAuth *} {* newPassword *} {* newPasswordConfirm *} {* /changePasswordFormNoAuth *} PASSWORD CHANGED Your password has been successfully updated. Sign in CREATE NEW PASSWORD We didn't recognize that password reset code. Enter your email below, and we'll send you another email. {* #resetPasswordForm *} {* signInEmailAddress *} {* /resetPasswordForm *} CREATE NEW PASSWORD We've sent you an email with instructions to create a new password. Your existing password has not been changed. Close * Facebook * Twitter * LinkedIn Social Login by Janrain Email Facebook LinkedIn Twitter Social Sharing by Janrain Share with Your Friends By Email Email sent Thanks for sharing with your contacts via email. Share with your other networks too! Start Over Select your contacts x + 11 Edit Done Close Done Selected contacts x + 11 Edit Done Close Done x + 30 Edit Done or browse contacts and 0 more x + It appears the URL has been modified. Restore? 0 Edit Done x + -192 Edit Done https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=link&utm_medium=EPSNewsPurchasingNow-20220315&oly_enc_id=7898C4385267I9R undefined Switch accounts Sign in to your email providerConnecting to email failed. %TAG%View Error%GAT%Send email directly using your email client!Send email directly Share On Your Timeline Shared on Your Timeline Thanks for sharing with your friends on Facebook. Share with your other networks too! Start Over x + 4 Edit Done or browse friends and 0 more x + It appears the URL has been modified. Restore? 0 Edit Done x + It appears the URL has been modified. Restore? 0 Edit Done https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=link&utm_medium=EPSNewsPurchasingNow-20220315&oly_enc_id=7898C4385267I9R undefined Switch accounts Connecting to Facebook failed. %TAG%View Error%GAT% Share Connect Share With Your Connections Shared to LinkedIn Thanks for sharing with your connections on LinkedIn. Share with your other networks too! Start Over x + 4 Edit Done or browse connections and 0 more x + It appears the URL has been modified. Restore? 0 Edit Done x + It appears the URL has been modified. Restore? 0 Edit Done https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=link&utm_medium=EPSNewsPurchasingNow-20220315&oly_enc_id=7898C4385267I9R undefined Switch accounts Sign in to your email providerConnecting to LinkedIn failed. %TAG%View Error%GAT%Send email directly using your email client!Send email directly Share Connect Tweet To Your Followers Shared to Twitter Thanks for sharing with your followers on Twitter. Share with your other networks too! Start Over x + 4 Edit Done or browse followers and 0 more x + It appears the URL has been modified. Restore? 140 Edit Done x + URL will be shortened 8 Edit Done https://www.embedded.com/top-three-tips-for-ensuring-software-supply-chain-security/?utm_source=newsletter&utm_campaign=link&utm_medium=EPSNewsPurchasingNow-20220315&oly_enc_id=7898C4385267I9R undefined Switch accounts Connecting to Twitter failed. %TAG%View Error%GAT% Share Connect X X SIGN UP / SIGN IN WITH A TRADITIONAL ACCOUNT... Email Address Validating Password Validating Forgot your password? Sign In Create Account Powered by Janrain