This group brings together the best thinkers on energy and climate. Join us for smart, insightful posts and conversations about where the energy industry is and where it is going.

Richard Brooks's picture
Co-Founder and Lead Software Engineer, Reliable Energy Analytics LLC

Dick Brooks is the inventor of patent 11,374,961: METHODS FOR VERIFICATION OF SOFTWARE OBJECT AUTHENTICITY AND INTEGRITY and the Software Assurance Guardian™ (SAG ™) Point Man™ (SAG-PM™) software...

  • Member since 2018
  • 1,535 items added with 670,627 views
  • Nov 19, 2020

Forrester has a new report available (see link below) on the risks that come with the use of web API's in an application. Web API's are external dependencies which your software relies on for proper operation. These external web API's represent another attack vector that a company must be aware of and include in their risk management plans. It is imperative that any SBOM standard that comes to light MUST include the ability to identify these external web API dependencies so that a software consumer will have the insights and visibility needed to perform an effective and comprehensive software supply chain risk assessment, like the seven step process implemented in SAG-PM, which has been presented as an Energy Central PowerSession, available on demand here

Customers need the ability to protect themselves from harmful software before any attempt at installation. An SBOM is a critical component of an effective software supply chain risk assessment process. The good work of Allan Friedman at NTIA is leading the effort to determine and define an effective SBOM standard to help companies identify and manage software risks.

Bob Meinetz's picture
Bob Meinetz on Nov 19, 2020

Richard, descriptions of the attack on Panera's database sound very much like an avoidable injection attack - ones that have been a problem for at least two decades.

My own experience: a small company, for which I had designed a custom web portal, was the victim of such an attack. Hackers obtained 8 customers' credit card data - but fortunately, customers were notified and cards cancelled before any money was stolen.

Creating hardened websites isn't cheap. For developers it requires spending time and money that isn't recoupable in hourly design rates. Even when clients are made aware of the risks, few are willing to invest in added security.

Every commercial website online today is being targeted by injection attacks (I've seen sites hit by thousands of them in a matter of minutes). After my experience, I can't afford not to invest the time and money - too much on the line.

Richard Brooks's picture
Thank Richard for the Post!
Energy Central contributors share their experience and insights for the benefit of other Members (like you). Please show them your appreciation by leaving a comment, 'liking' this post, or following this Member.
More posts from this member

Get Published - Build a Following

The Energy Central Power Industry Network is based on one core idea - power industry professionals helping each other and advancing the industry by sharing and learning from each other.

If you have an experience or insight to share or have learned something from a conference or seminar, your peers and colleagues on Energy Central want to hear about it. It's also easy to share a link to an article you've liked or an industry resource that you think would be helpful.

                 Learn more about posting on Energy Central »