{"id":20411,"date":"2021-12-23T18:39:53","date_gmt":"2021-12-23T18:39:53","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20411"},"modified":"2021-12-23T18:42:34","modified_gmt":"2021-12-23T18:42:34","slug":"supply-chain-attacks-will-peak-in-2022","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/","title":{"rendered":"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts"},"content":{"rendered":"<p>Cyberthreats against software supply chains moved to the forefront of cybersecurity concerns a year ago when revelations of the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/solarwinds-attackers-targeting-resellers-service-providers\/\">attack on software maker SolarWinds<\/a> emerged.<\/p>\n<p>Now one security researcher \u2013 Moshe Zioni, vice president of security research for <a href=\"https:\/\/www.esecurityplanet.com\/trends\/2021-rsac-innovation-contest\/\">application risk management startup Apiiro<\/a> \u2013 is predicting that supply chain attacks will likely peak in 2022 as organizations leverage new products that will help them better detect these attacks.<\/p>\n<p>Vendors like Apiiro have been working to protect enterprises against supply chain attacks that have been on the upswing for several years, with bad actors lured by the success of these campaigns and the money that could be made, Zioni told <em>eSecurity Planet<\/em>.<\/p>\n<figure id=\"attachment_20415\" aria-describedby=\"caption-attachment-20415\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20415\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/Apiiro-Moshe-Zioni-e1640284341196.jpg\" alt=\"Apiiro Moshe Zioni\" width=\"300\" height=\"300\" \/><figcaption id=\"caption-attachment-20415\" class=\"wp-caption-text\">Moshe Zioni, Apiiro VP of Security Research<\/figcaption><\/figure>\n<p>Now more products are coming to market that make it easier for enterprises to detect such attacks and protect themselves against them, Zioni said.<\/p>\n<p>\u201cOur ways of data mining and positioning the data security lifecycle against supply chain attacks have gained some ground over the past couple of years, more than before,\u201d he said. \u201cSupply chain attacks are something that have been on the rise for a few years now. This is more than a cat-and-mouse game. It&#8217;s been a detection game for us for the better part of 10 years-plus for the application security realm.\u201d<\/p>\n<h2><strong>Supply Chain Attacks an Ongoing Threat<\/strong><\/h2>\n<p>Going into 2022, threat groups will continue to <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/sbom\/\">target the supply chains<\/a> of enterprises, which give them new avenues into greater numbers of potential victims. However, improved defenses are beginning to shift the advantage to end customers.<\/p>\n<p>\u201cAt some point we&#8217;re going to see a peak,\u201d Zioni said. \u201cThen through some detections and preventions [offerings from vendors] like a Apiiro, you will see much more detection and we will bring the upper hand back to the developers and enterprises.\u201d<\/p>\n<p>That would be good news for enterprises, which have been on edge since details of the SolarWinds attack, perpetrated by the Russia-linked cyberthreat group Nobelium, broke late in 2020. The hackers inserted malicious code into updates of SolarWinds\u2019 Orion IT monitoring software, putting at risk thousands of customers that had downloaded the updates (though the actual number of businesses hacked through the Sunburst malware was fewer than 100).<\/p>\n<p><em>Also read: <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\"><em>Best Backup Solutions for Ransomware Protection<\/em><\/a><\/p>\n<h2><strong>2021 a Tough Year in the Supply Chain<\/strong><\/h2>\n<p>Throughout 2021, there were myriad other <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">supply chain attacks<\/a>, including one in which another Russia-based threat group, REvil, leveraged a vulnerability in software company Kaseya\u2019s remote monitoring and management (RMM) software to launch a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/kaseya-ransomware-arrest\/\">ransomware attack<\/a> that impacted thousands of its customers.<\/p>\n<p>Both incidents were part of a larger global push by cybercriminals targeting weaknesses in supply chains. Cybersecurity company BlueVoyant found in a <a href=\"https:\/\/www.bluevoyant.com\/resources\/managing-cyber-risk-across-the-extended-vendor-ecosystem\/\">report<\/a> released in October that 97 percent of respondents to a survey said their companies had been negatively impacted by a cybersecurity breach in their supply chains and 93 percent said they had been affected by a direct cybersecurity breach due to weaknesses in their supply chain.<\/p>\n<p>In addition, 91 percent said that their budgets for third-party cyber-risk management would increase in 2021. In a statement, Adam Bixler, global head of third-party cyber risk management at BlueVoyant, said that \u201ceven though we are seeing rising awareness around the issue, breaches and the resulting negative impact are still staggeringly high, while the prevalence of continuous monitoring remains concerningly low.\u201d<\/p>\n<p>Third-party cyber-risk must become a priority at companies, Bixler said.<\/p>\n<p>With more tools coming to market that add security layers to DevOps and application environments, organizations will have the tools to make it a priority, Zioni said. That will be important given the rapid changes happening in those areas that are helping to fuel the increase in supply chain-based attacks, he said.<\/p>\n<p><em>Further reading: <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\"><em>Best Third-Party Risk Management (TPRM) Tools for 2022<\/em><\/a><\/p>\n<h2><strong>Agile Development, Standards Help Fuel Attacks<\/strong><\/h2>\n<p>Factors adding to supply chain risk include the increasingly agile mindset of developers and the expanding use of cloud-native applications. A major focus of DevOps is on speed \u2013 think of continuous integration\/continuous deployment (CI\/CD) \u2013 and enterprises are wary of putting in place security measures that slow down the process. The agile process also means being more reliant on third parties, Zioni said. However, that doesn\u2019t mean that everything is inherently less secure.<\/p>\n<p>\u201cBecause of this distributed way of trusting and to use third parties, you actually have a much more robustness in terms of data protection, in terms of compliance and in terms of what kinds of capabilities those kinds of options offer for DevSecOps and for developers and application security managers,\u201d he said. \u201cBut on the other hand, it also means that this is a new complexity that security practitioners have been dealing with for the past few years. Those are the things that actually made the shift in terms of how enterprises can protect the lifecycle.\u201d<\/p>\n<p>There also is greater standardization and regulation that must be met by enterprises, and cybersecurity vendors also need to catch up to those in order to detect and prevent supply chain attacks.<\/p>\n<p><em>Further reading: <\/em><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/compliance-gdpr-pipl-ccpa\/\"><em>How to Comply with GDPR, PIPL and CCPA<\/em><\/a><\/p>\n<h2><strong>Bad Actors Have Early Advantage<\/strong><\/h2>\n<p>The combination of the sophistication of attackers and the work enterprises need to do to put in the necessary controls to prevent the attacks means that the scales are tipped in the direction of the bad actors still, at least for the moment.<\/p>\n<p><strong>\u201c<\/strong>Statistically speaking, attackers will have some kind of upper hand,\u201d Zioni said. \u201cIt doesn&#8217;t mean that they will succeed every time, but this is statistically speaking. It will still be the case until the gap is bridged as soon as possible by enterprises. That means that after this peak, it will plateau and the upper hand will be back to the enterprises&#8217; hands.\u201d<\/p>\n<p>Once this happens, there will be fewer supply chain attacks in the coming years, he said, adding that he was reluctant to say when this will happen. However, he is sure it will.<\/p>\n<h2><strong>New Supply Chain Security Tools on the Way<\/strong><\/h2>\n<p>Vendors are launching more products that offer greater capabilities to detect cyberthreats \u2013 including supply chain threats \u2013 and touch on areas like inventory and asset discovery, CI\/CD security, continuous compliance and code risk assessments. All of those are part of Apiiro\u2019s platform as well, Zioni said.<\/p>\n<p>The company launched in 2019 and Zioni signed on in September after almost four years as director of threat research at Akamai Technologies. Apiiro\u2019s Code Risk Platform is designed to offer a range of capabilities in a single place, creating less complexity and greater integration. He said the goal is to be a one-stop shop for enabling organizations to control and manage their products. There is both development and infrastructure profiling.<\/p>\n<figure id=\"attachment_20414\" aria-describedby=\"caption-attachment-20414\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20414\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/Apiiro-CICD-security-e1640284221278.jpg\" alt=\"Apiiro CICD security\" width=\"900\" height=\"583\" \/><figcaption id=\"caption-attachment-20414\" class=\"wp-caption-text\">The Apiiro CICD security platform<\/figcaption><\/figure>\n<p>In February, in the wake of the SolarWinds attack and with $35 million in funding raised in October 2020, Apiiro unveiled two offerings designed to detect and block such attacks. One is to defend against build-time code injection, which was central to what the SolarWinds attackers did. Another product is aimed at detecting abnormal behavior in developer identities, helping organizations identify compromised accounts and insider threats.<\/p>\n<p>In addition, the company in November rolled out its Dependency Combobulator, an open-source toolkit that is designed to detect and prevent dependency confusion attacks, a growing threat in supply chain attacks. With dependency confusion attacks, cybercriminals deliver malicious components into the open-source ecosystem by tricking end users, developers and automation systems into installing a malicious dependency package that has the same name of the privately-used packages they normally leverage.<\/p>\n<p><em>Further reading: <\/em><a href=\"https:\/\/www.esecurityplanet.com\/applications\/top-code-debugging-and-code-security-tools\/\"><em>Top Code Debugging and Code Security Tools<\/em><\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fc7bed084-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fc7bed084\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fc7bed084\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fc7bed084\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fc7bed084\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fc7bed084\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fc7bed084\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyberthreats against software supply chains moved to the forefront of cybersecurity concerns a year ago when revelations of the attack on software maker SolarWinds emerged. Now one security researcher \u2013 Moshe Zioni, vice president of security research for application risk management startup Apiiro \u2013 is predicting that supply chain attacks will likely peak in 2022 [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20413,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,15],"tags":[23458,30620],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,379],"class_list":["post-20411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-threats","tag-supply-chain-security","tag-third-party-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Software supply chain hacks wreaked havoc in 2021. One cybersecurity researcher says things will get better in 2022.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Software supply chain hacks wreaked havoc in 2021. One cybersecurity researcher says things will get better in 2022.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-23T18:39:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-23T18:42:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png\" \/>\n\t<meta property=\"og:image:width\" content=\"924\" \/>\n\t<meta property=\"og:image:height\" content=\"663\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts\",\"datePublished\":\"2021-12-23T18:39:53+00:00\",\"dateModified\":\"2021-12-23T18:42:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/\"},\"wordCount\":1278,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png\",\"keywords\":[\"supply chain security\",\"third-party security\"],\"articleSection\":[\"Applications\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/\",\"name\":\"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png\",\"datePublished\":\"2021-12-23T18:39:53+00:00\",\"dateModified\":\"2021-12-23T18:42:34+00:00\",\"description\":\"Software supply chain hacks wreaked havoc in 2021. One cybersecurity researcher says things will get better in 2022.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png\",\"width\":924,\"height\":663,\"caption\":\"Apiiro security platform\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts | eSecurity Planet","description":"Software supply chain hacks wreaked havoc in 2021. One cybersecurity researcher says things will get better in 2022.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/","og_locale":"en_US","og_type":"article","og_title":"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts | eSecurity Planet","og_description":"Software supply chain hacks wreaked havoc in 2021. One cybersecurity researcher says things will get better in 2022.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/","og_site_name":"eSecurity Planet","article_published_time":"2021-12-23T18:39:53+00:00","article_modified_time":"2021-12-23T18:42:34+00:00","og_image":[{"width":924,"height":663,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts","datePublished":"2021-12-23T18:39:53+00:00","dateModified":"2021-12-23T18:42:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/"},"wordCount":1278,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png","keywords":["supply chain security","third-party security"],"articleSection":["Applications","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/","url":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/","name":"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png","datePublished":"2021-12-23T18:39:53+00:00","dateModified":"2021-12-23T18:42:34+00:00","description":"Software supply chain hacks wreaked havoc in 2021. One cybersecurity researcher says things will get better in 2022.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Apiiro-platform.png","width":924,"height":663,"caption":"Apiiro security platform"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/supply-chain-attacks-will-peak-in-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20411"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20411"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20411\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20413"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20411"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20411"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20411"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}