You could argue that a big part of cybersecurity is dealing with bugs found in code—both bugs known and unknown at a given point in time. These bugs could present vulnerabilities and eventually increase the risk of bad actors (like the fictional bad actor Eve) exploiting the vulnerabilities in code to compromise applications running in your environment. What we’re also seeing is that it’s taking less and less time for bad actors to weaponize vulnerabilities in code, which is an alarming trend.
If you need a prime example of why this topic matters, you need look no further than the SolarWinds attack. SolarWinds was breached, and software used by their customers was compromised by a nation-state bad actor. This kind of attack is commonly referred to as a supply chain attack. In a supply chain attack, bad actors look to compromise an environment through less-secure elements in the supply chain (for example, a software vendor whose software is used).
Note
To learn more about the SolarWinds attack, you can start at http://mng.bz/zXPa.