How to Snare Software Supply Chain Hackers With HoneytokensGitGuardian's Mackenzie Jackson on Tracking Adversaries and Detecting Attacks
Attackers targeting the software supply chain are "quite predictable in their movements; they want to persist their access, so they're looking for credentials," said Mackenzie Jackson, developer advocate at GitGuardian. In a supply chain attack, it could take weeks and even months before a problem is detected, he said.
Jackson recommends the deployment of honeytokens to document and track the predictability of criminals' actions. "We can track where the attackers go, and we can find information about them, what tools they're using and how they're trying to exploit us," he said.
In this video interview with Information Security Media Group, Jackson discussed:
- How software supply chain attacks have evolved in recent years;
- Why traditional security tools and defenses are not able to prevent these attacks;
- How honeytokens can help organizations in their supply chain defenses.
Jackson shares his passion for code security with developers and works closely with research teams to show how malicious actors discover and exploit vulnerabilities in code. Previously, he was co-founder and former CTO of a healthcare tech startup, where he learned firsthand how critical it is to build secure applications with robust developer operations.