RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityJune 8, 2022

Taking the quiz: Are you up to speed on supply chain risk?

ReversingLabs delivered a game-show style review of its survey on software supply chain security at RSA Conference. Here are the questions and answers.

smiling woman with glasses
Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
Taking the quiz: Are you up to speed on supply chain risk?

ReversingLabs' Jasmine Noel switched it up a bit at RSA Conference with her "Software Supply ChainSecurity Is No Game, Or Is It?" presentation, and made it an interactive experience for those watching. Her game-show for attendees made it fun, but also covered key information on the state of software supply chain security from ReversingLabs’ recent survey of 300 global IT and security professionals.

Here are some of those question posed to the audience from that survey.

Get key takeaways on software security from a survey of 300+ security professionals Download the report: Flying Blind: Firms Struggle to Detect Software Supply Chain Attacks

Question 1: What software supply chain risk is the biggest concern for software companies today?

The answer: software vulnerabilities. Noel highlighted that this survey finding made sense when looking back on the impact of Log4j, which made the industry more aware of the risks associated with software vulnerabilities. To continue, she asked attendees what percentage of organizations can actually detect software tampering, another major supply chain risk.

An audience member guessed the answer correctly: only (37%) of software-publishing organizations can actually detect tampering. Pushing on tampering further, Noel asked a follow up: How many of these organizations who do check for tampering, check after the build process is complete? Attendees, unable to correctly answer the question, were stunned to learn that roughly half of these organizations do not check after the build.

Question 2: What are the top reasons organizations use SBOMs?

Moving on from direct supply chain risks, Jasmine discussed the importance of utilizing Software Bills of Materials (SBOMs) in the fight to secure software. She again tapped into the findings of our survey to quiz the attendees on their knowledge of the state of SBOMs. First, she asked the audience what the top reasons are for why organizations use SBOMs.

Attendees guessed correctly: Wanting to discover if risks are present in a software product, as well as wanting to follow best practices.

Question 3: Why are many organizations still not generating and reviewing SBOMs?

Next, Noel asked attendees why many organizations still are not generating and reviewing SBOMs, despite all of the attention given to them, by the Feds and beyond.

The answer: A general lack of internal expertise and staffing to get the job done properly. Finally,

Question 4: Which SBOM components are reviewed most?

Jasmine tested attendees on what components of an SBOM are reviewed the most. A number of members in the audience correctly answered, saying that both internally developed components along with open source components are the key factors for most organizations when reviewing an SBOM.

The real prize: Understanding the risk of software supply chain attacks

The folks who answered Noel’s questions were rewarded with prizes, making for a true game show experience. But there is no question of whether software supply chain security is a game or not.

From the look of these survey findings… it definitely isn’t. It’s clear that the industry as a whole is lacking in its ability to secure software, and needs modern day solutions to solve this ever growing concern. To learn more about the state of software security, check out ReversingLab's new report on the recent survey.

ReversingLabs offers innovative solutions that meet the needs of the software industry. If you would like to learn more about how we aid organizations’ software assurance strategies, check out secure.software, our modern-day solution to tackling software supply chain risk. We are now offering early access to the full launch of this solution, so be sure to talk with us to get all of the benefits this solution could bring your organization.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

AI coding racing

Can AppSec keep pace with AI coding?

AI lets software teams generate code at a rate faster than security can validate it. One way to win the race: more AI.

Learn More about Can AppSec keep pace with AI coding?
Can AppSec keep pace with AI coding?
Finger on map

LLMmap puts its finger on ML attacks

Researchers show how LLM fingerprinting can be used to automate generation of customized attacks.

Learn More about LLMmap puts its finger on ML attacks
LLMmap puts its finger on ML attacks
Vibeware bad vibes

Vibeware: More than bad vibes for AppSec

Threat actors are leveraging the freewheeling vibe-coding trend to deliver malicious software at scale.

Learn More about Vibeware: More than bad vibes for AppSec
Vibeware: More than bad vibes for AppSec
CRA accelerates advantage

The CRA is coming: Are you ready?

Here's how the EU's Cyber Resilience Act will reshape the software industry — and how that accelerates advantages.

Learn More about The CRA is coming: Are you ready?
The CRA is coming: Are you ready?

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top