Is your most dangerous vendor the most connected one?

by Black Hat Middle East and Africa
on
Is your most dangerous vendor the most connected one?

Supply chain security has, conventionally, been framed around the idea that you have to identify the weakest link to reduce risk. But modern digital infrastructure doesn’t behave like a chain – it behaves more like a network.

And in a network, the most dangerous point is not necessarily the weakest node – it’s often the most connected one. 

Research from the 2026 Black Kite Third-Party Breach Report shows how cyber incidents increasingly propagate through supplier ecosystems rather than remaining isolated within a single organisation. Widely shared technology providers can create systemic exposure when they’re compromised, affecting multiple downstream customers.

Which means supply chain risk is becoming ecosystem risk. A breach affecting a critical provider could ripple across many organisations that rely on that supplier – amplifying the impact far beyond the original victim. 

If you lead security at an organisation that works with external vendors, this means it’s time to rethink how you approach third-party security. 

Concentration is the new risk multiplier

Most organisations now rely on a relatively small number of shared platforms – cloud providers, SaaS services, software libraries and technology partners embedded throughout their operations.

That concentration creates efficiency and speed, but it also creates fragility. Because when widely used providers experience security failures, the consequences can spread across multiple organisations that share the same dependency (like the Cloudflare outage last year). 

The Black Kite research highlights this challenge as a problem of dependency concentration. The risk used to depend primarily on whether a supplier had strong security controls, but now it’s also very much about how many organisations rely on that supplier, and how deeply it’s integrated into their systems.

This is why modern third-party risk management has to gradually shift from vendor checklists to ecosystem visibility – understanding where dependencies cluster and where the largest potential blast radius might be.

Visibility is improving, but control still lags

At first glance, organisations do appear to be making progress on software supply chain transparency. The 2026 report from Manifest, Beyond the Black Box, finds that 60% of organisations now generate Software Bills of Materials (SBOMs) to catalogue the components inside their software.

But the report draws a crucial distinction between generating transparency artefacts and using them effectively.

Overall SBOM usage stands at 41.8%, which Manifest defines as organisations that either generate SBOMs or actively manage and consume them as part of their security processes.

Many organisations are still struggling to operationalise supply chain data.

The report finds that:

  • 56.3% say Software Composition Analysis (SCA) tools create excessive noise or delays for development teams, making it harder to prioritise meaningful risks.
  • 46.4% are sceptical that these tools meaningfully reduce software-related risk.

More than just a lack of information, the challenge here is turning visibility into actionable risk management. Security teams may receive SBOMs, provenance records or other transparency artefacts from vendors during procurement. But without processes to ingest and continuously monitor that information, those artefacts provide limited operational value.

AI is widening the supply chain blind spot

AI is now introducing additional layers of dependency across the technology stack. Manifest’s research shows 63% of organisations report shadow AI usage, where tools, models or integrations are adopted without clear oversight from security or procurement teams.

At the same time, 56.7% of organisations say they are training open-weight AI models on internal data, which introduces new risks around data exposure, licensing and governance. And 93% say their organisations still have significant room for improvement in understanding the legal, licensing and IP obligations surrounding AI.

The Manifest report concludes that AI systems are reintroducing familiar supply chain problems – opaque dependencies, uncertain provenance and unclear accountability across models, datasets and third-party services.

A new question for CISOs

For security leaders, the key question in third-party risk is, increasingly, how many organisations depend on each vendor – and what happens if that vendor fails.

Answering that question requires a broader view of digital supply chains – the ability to map shared dependencies and understand where ecosystem concentration exists, then ensure transparency across suppliers. 

Because in today’s connected technology landscape, the most dangerous supplier may just be the one everyone relies on.

Share on

Join newsletter

Join the newsletter to receive the latest updates in your inbox.


Follow us


Topics

Sign up for more like this.

Join the newsletter to receive the latest updates in your inbox.

Related articles

Has AI hype reached its peak?

Has AI hype reached its peak?

AI hype is peaking. Dr Rumman Chowdhury explains why use cases remain limited, AGI definitions are shifting, and investors are starting to question the narrative.

Read More