Why I Joined Hunted Labs: Paul Novarese, Principal Solutions Architect

Written by:

Paul Novarese

Principal Solutions Architect

Share:

Share:

My whole career has revolved around helping enterprises use open source software, and the vast majority of that time I’ve focused on security. The last few years in particular, I have been primarily focused on application security. In that time, I’ve noticed that while there has been an explosion of tools in this segment, there are still some serious unsolved problems, especially where the software supply chain is concerned. Hunted Labs is the first to not only see the same gaps I’ve identified, but to actually do something about them. So, when the opportunity presented itself to join the team, I knew I had to take it.

Three Unaddressed Problems in Securing Modern Software

  • We no longer fully understand how our software actually gets built
  • We underestimate how much open source software we’re consuming
  • We’re completely unaware of how much trust we’re placing in open source maintainers

The Hidden Dangers of Dependencies

Modern applications are built on a foundation of open source dependencies, each with its own set of transitive dependencies. This intricate web introduces vulnerabilities that many developers never consider. The Log4Shell incident a couple of years ago, which allowed hackers to run wild on affected systems, serves as a stark reminder of how seemingly innocuous libraries can pose significant security risks.


The Overwhelming Scale of Open Source Usage

The sheer volume of open source packages used in today’s software development has grown exponentially. This growth has made it increasingly challenging to keep up with security patches and advisories. The recent inability of NIST to maintain the National Vulnerability Database (NVD) underscores the unsustainability of our current approach to managing these risks.


The Reality of Malicious Actors in Open Source

The recent XZ Utils incident proved that the threat of malicious actors infiltrating open source projects is no longer theoretical. It is a fact. A sophisticated and likely state-sponsored attack, the event demonstrates how vulnerabilities can be introduced into critical infrastructure through obscure yet pivotal projects. It also highlights the need for better tools and processes to identify and mitigate such threats.


Why Hunted Labs?

In my various roles as a consultant, account manager, and sales engineer, I’ve had countless conversations with developers and security professionals about their challenges and pain points. While many security vendors promise comprehensive solutions, most of them are just reheated versions of yesterday’s tools.

Hunted Labs isn’t building a panacea – nor does it make that promise – but from what I’ve seen (and what ultimately led me to choose Hunted Labs) is the opportunity it presents to make a meaningful difference in protection of the software supply chain. By leveraging new data sources and building new tools that provide deeper insights into our customers’ projects, we can better understand the open source ecosystem and the risks it presents.

I’m thrilled to be part of the Hunted Labs team, and I look forward to the impact we’ll make throughout the world of software security and development.

Share

The Hunting Ground

Hayden Smith

The following is a story about the recent XZ Utils security breach and how things came about. Formore context on the

Our Blog

Request A Demo

Fill out the form below so we can arrange a product demo for you.

    Request A Demo

    Fill out the form below so we can arrange a product demo for you.

    Thank You

    We have received your submission.