Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Tech Industry Faces New Demands to Build Secure Software
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Tech Industry Faces New Demands to Build Secure Software

Highlights

  • Rapid software releases elevate cyber risks and attract sophisticated attackers.

  • Major breaches reveal the limits of prioritizing speed over security.

  • Transparency and testing are now central to building trustworthy technology solutions.

Samantha Reed
Last updated: 2 February, 2026 - 2:19 pm 2:19 pm
Samantha Reed 2 hours ago
Share
SHARE

Contents
Why Are Recent Software Breaches Drawing Attention?What Weaknesses Are Attackers Exploiting Now?Can Vendors Deliver Innovation and Security Simultaneously?

The technology sector long favored rapid development, often taking risks in pursuit of innovation. Mark Zuckerberg’s philosophy, “Move fast and break things,” shaped not just Facebook, but spread across Silicon Valley and influenced global business strategies. Today, this mindset faces scrutiny as security incidents involving companies such as Trust Wallet and Salesforce point to increased vulnerabilities resulting from hastened production cycles. Many organizations now question whether moving quickly is sustainable when attackers exploit weaknesses in software supply chains and application dependencies. As expectations for accountability rise, developers, users, and regulators are debating what needs to shift for a safer digital environment.

Unlike earlier reporting, which emphasized the benefits of quicker product launches and innovation, current analysis highlights mounting costs tied to security lapses. Stories about breaches at Microsoft Sharepoint or Salesforce underscore more severe follow-on impacts—reaching federal agencies and global infrastructure. Earlier coverage typically reviewed technical flaws, but industry discourse has broadened to regulatory compliance and customer expectations. The response to events like the SolarWinds and Ivanti security failures shifted focus from speed alone to holistic software risk management that encompasses the entire supply chain.

Why Are Recent Software Breaches Drawing Attention?

Recent incidents, such as the $8.5 million loss through Trust Wallet’s compromised Chrome extension, have underscored the consequences of speed-focused development. Attackers gained leverage after leaking code repository credentials, which allowed them direct access to source code and third-party integrations.

What Weaknesses Are Attackers Exploiting Now?

Modern attackers target both legacy software and contemporary cloud-based applications, leveraging older vulnerabilities and weakly protected APIs. Complex supply chains and reliance on third-party modules, as seen in the Salesforce OAuth token theft, provide new entry points for intrusions. As one leader reflected,

“Unless you are breaking stuff, you are not moving fast enough.”

Can Vendors Deliver Innovation and Security Simultaneously?

Balancing rapid product development with resilient security now commands industry attention. Application security tools such as SCA, SAST, and DAST remain vital, but firms are now testing compiled binaries for hidden threats pre-release. Transparency is gaining traction, with calls for sharing detailed software bills of materials like SBOMs and MLBOMs to show product components. The evolving consensus urges a security-first approach:

“Make Smart and Safe Things.”

As digital infrastructure’s importance grows, so does the pressure on tech firms to uphold security and transparency. Widespread, high-impact incidents—including those involving Microsoft, 3CX, and SolarWinds—demonstrate systemic vulnerabilities that rapid development alone cannot fix. Recognizing software suppliers as potentially vulnerable rather than inherently trustworthy is increasingly essential. Readers interested in software procurement should prioritize vendors who disclose their software compositions and invest heavily in both code quality and security practices. Understanding risk in the supply chain, staying alert to third-party dependencies, and insisting on product transparency will help organizations better defend against growing cyber threats while maintaining responsible innovation.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

U.S. Authorities Target Piracy Sites as Italy Shuts Illegal IPTV Operations

Google Cuts Millions of Devices from Malicious Proxy Network

Secret Service Official Urges Stricter Controls on Domain Registration

North Korean Cyber Group Splits to Target Multiple Sectors

Hackers Bypass FortiCloud SSO, Target Fortinet Security Products

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article ThoughtSpot Deploys BI Agents to Advance Active Analytics

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

ThoughtSpot Deploys BI Agents to Advance Active Analytics
AI
Users Adjust Key Apple Watch Settings for Better Experience
Wearables
IotaComm Releases 800 MHz LoRaWAN Reference Design for Licensed Spectrum
IoT
Tesla Expands Robotaxi Fleet with Multiple Vehicle Types
Electric Vehicle
Robotics Leaders Drive New Advances in January 2026
AI Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?