RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Products & TechnologyFebruary 24, 2025

SCA Is No Longer Relevant: Insights From the Founder of Black Duck

The future of application security requires a shift beyond traditional tools.

black and white headshot of man
Doug Levin, Member, Board of Directors at ReversingLabsDoug Levin
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
black rubber ducky leaning forward

I founded Black Duck Software in December 2002, and served as its first CEO for many years. Black Duck has long been recognized as a pioneer in open-source compliance and vulnerability management. Since its inception, it has played a pivotal role in shaping the software composition analysis (SCA) industry. My deep history with Black Duck, combined with my early contributions to the SCA space, provides me with a unique perspective on the evolving challenges facing application security (AppSec).

A New Era of Software Supply Chain Attacks

The landscape of cyber threats has shifted. The rise of sophisticated attacks, such as those targeting SolarWinds Orion and 3CX, demonstrates that adversaries are no longer simply exploiting software vulnerabilities — they are infiltrating development pipelines, and injecting malicious code into trusted software before it even reaches end users.

Today’s software supply chain threats extend well beyond outdated open-source packages with known, exploitable Common Vulnerabilities and Exposures (CVEs) — the focus of traditional SCA tools, and an area in which they have historically excelled. Attackers are now leveraging weaknesses in continuous integration/continuous delivery (CI/CD) pipelines, open-source package repositories, code-signing mechanisms, as well as closed source, third-party software modules to compromise software integrity before it is even deployed.

This evolving threat landscape requires organizations to expand their AppSec focus. Visibility must extend beyond open-source dependencies and licensing issues to include build artifacts, proprietary code, and third-party applications.

The Gap in Traditional SCA

The reality today is that most SCA solutions have not kept pace with the changing threat landscape, leaving organizations exposed to risks they simply cannot detect. And despite the rapid evolution of software supply chain threats, many SCA vendors continue to concentrate on known vulnerabilities in open-source libraries — often overlooking the more pressing risks posed by sophisticated code tampering and malware injection.

While the generation of software bills of materials (SBOMs) remains valuable, it is not sufficient to eradicate software supply chain threats — especially when it is only focused on the open-source components. Modern applications are comprised of a complex mix of proprietary, third-party, and open-source components, along with machine learning (ML) model training data, compiled binaries, and other critical build artifacts. AppSec solutions must evolve to meet the demands of these complex supply chains.

This gap between tools and threats leaves many organizations blind to deeply embedded risks within their software supply chains. Attackers recognize these blind spots — and exploit them effectively. The leading SCA firms have been slow to adapt. Instead, the commoditization of SCA tools, combined with a lack of critical investment in innovation, has resulted in flagging demand and market shifts, producing a storm of spin-offs, and acquisitions that highlight the SCA sector’s quandary — and the urgent need for a new approach.

Why a Modern Software Supply Chain Security Strategy Is Required

To effectively secure modern software, organizations must prioritize a holistic, forward-thinking AppSec strategy —one that goes beyond licensing concerns and static vulnerability scanning.

The future of AppSec requires:

  • Proactive Detection of Malware and Tampering: Organizations must establish rigorous standards for detecting malware, ransomware, and Advanced Persistent Threats (APTs). Security measures should focus on identifying tampering, malicious code injection, and vulnerabilities actively exploited in the wild.
  • Transparency and Verifiable Security Assurance: Software vendors and users must collaborate on security reporting that offers granular transparency. This includes detailed software change tracking, SBOMs, and VEX reports, as well as third-party verification mechanisms that assess software security, safety, and quality.
  • Visibility Beyond Source Code: Effective security analysis should extend to compiled binaries, third-party components, and development artifacts, ensuring the integrity of software even when source code is unavailable.
  • Automated, Scalable Threat Analysis: Security solutions must integrate seamlessly with development workflows, offering automated assessments that do not impede productivity. Organizations need tools that provide rapid, scalable insights into software integrity.
  • Pre-Deployment and Post-Build Security Verification: Both software producers and end users must be equipped to detect unauthorized modifications across all components, scanning software packages before deployment to prevent the distribution of malicious code.

The Path Forward for Managing Software Risk

Securing software supply chains today requires real-time, comprehensive visibility across all application components — not just open-source dependencies. Organizations must rethink their security priorities and invest in solutions that address today’s threats, not just yesterday’s vulnerabilities.

That is why ReversingLabs, a company at the forefront of modern AppSec, caught my attention. ReversingLabs is pioneering solutions that provide deep insights into software integrity, offering organizations the tools they need to detect and mitigate emerging threats. For companies looking to secure their software supply chains with cutting-edge technology, ReversingLabs Spectra Assure represents a powerful step forward. That is why I am honored to serve on the Board of Directors at ReversingLabs, as well as several other AI, security, anti-fraud and blockchain technology companies.

The future of AppSec lies in adaptability, innovation, and a proactive stance against emerging threats. Organizations that embrace these principles will not only enhance their security posture, but also build greater trust with their customers and partners in an increasingly complex digital world.

For more of Doug Levin's perspectives, see his Substack.


Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Products & Technology

More Blog Posts

QR Code Phishing Is Evolving: Here’s How Your Detection Can Keep Up

QR Code Phishing Evolves: How to Keep Up

Here's what you need to know about the rise of quishing — and how your threat hunting team can get out in front of it.

Learn More about QR Code Phishing Evolves: How to Keep Up
QR Code Phishing Evolves: How to Keep Up
Why RL Built Spectra Assure Community

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Learn More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community
How a Simple YARA Rule Catches What AV Misses

ClickFix: YARA Rules Catch What AV Misses

Learn about the antivirus detection gap — and how to develop a simple YARA rule using Spectra Analyze.

Learn More about ClickFix: YARA Rules Catch What AV Misses
ClickFix: YARA Rules Catch What AV Misses
Polyglot File Examination with Spectra Analyze

How to Examine Polyglot Files with Spectra Analyze

Here's how to assess a sample using Spectra Analyze in your environment — and create a YARA rule.

Learn More about How to Examine Polyglot Files with Spectra Analyze
How to Examine Polyglot Files with Spectra Analyze

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top