All posts

Five Trends for You in 2025 Software Supply Chain Protection

In 2025, the landscape of software supply chain security is being reshaped by several pivotal trends aimed at fortifying defenses against increasingly sophisticated cyber threats.​
Xygeni | Software Supply Chain Security

2025 trends

 

1. Integration of Artificial Intelligence (AI)

Organizations are increasingly leveraging AI to enhance threat detection and response within their software supply chains. Agentic AI systems, capable of autonomously analyzing data and executing pre-approved actions, are being adopted to manage the growing volume and complexity of cyber threats. Codenotary has integrated AI into both Trustcenter and Guardian product to detect and autonomously remediate security issues.

2. Emphasis on Secure Software Development Practices

The adoption of 'secure by design' principles is gaining momentum, focusing on embedding security measures throughout the software development lifecycle. This approach aims to proactively identify and address vulnerabilities, reducing the risk of exploitation in production environments.
 

3. Regulatory Developments

Governments are enacting stringent regulations to enhance software supply chain security. For instance, the European Union's Cyber Resilience Act mandates that software products meet specific cybersecurity standards, including automatic security updates and comprehensive risk assessments. Non-compliance can result in substantial fines, underscoring the importance of adherence to these regulations.
 

4. Addressing Open-Source Software Risks

The prevalence of open-source components in software development introduces significant security challenges. Malicious actors exploit vulnerabilities in widely used open-source packages, as evidenced by incidents involving the Python Package Index (PyPI). Organizations are implementing rigorous vetting processes for open-source dependencies and utilizing tools to detect and mitigate risks associated with these components. Codenotary’s Guardian is the leader in this category with its wide range of supported software packaged, and Linux distributions (over 20 Linux distributions as April 2025).

5. Adoption of Confidential Computing

To protect sensitive data during processing, companies are turning to confidential computing. This technology utilizes Trusted Execution Environments (TEEs) to safeguard data from unauthorized access, even within compromised systems, enhancing overall data security in the software supply chain. Codenotary’s Trustcenter is implemented at many large banks, governments and transport companies as the standard solution or TEE.