Skip to main content
  • login
  • contact
  • language
    • English
    • Français
    • Español
    • Português
    • Deutsch
    • Italia
    • 简体中文
    • 日本語
  • search
X
    GEP Logo GEP Logo
    • Company  
        • About Us 
        • Culture 
        • Careers 
        • Contact Us 
        • AI-First at GEP
        • Sustainability at GEP

        About Us

        • Leadership
        • Customers
        • Partners
        • News
        • GEP in the News
        • Events
        • Mission & Vision
        • Awards & Recognition
        • Contact Us
        GEP leads Gartner 2025 Magic Quadrant for Source-to-Pay Suites

        GEP Is a Leader in the 2025 Gartner® Magic Quadrant™ for Source-to-Pay Suites

        Read More
        A Procurement Software Platforms Leader — 4 Years Running

        Tariff Resource Center: Strategies and Action Plans 

        Read More

        Culture

        • Diversity
        • GEP Cares
        • GEP Core Values
        • Women at GEP
        A Procurement Software Platforms Leader — 4 Years Running

        GEP & Xylem Unite to Bring Clean Water to 1,800 in Maharashtra

        Mapping & Reducing Scope 3 Emissions: A Quickstart Guide for Procurement Pros

        GEP & Akshaya Patra: Partnering to Deliver 4 Billion Meals and Fight Hunger Worldwide

        Careers

        • Explore Global Careers Opportunties
        • North American
        • Europe
        • India
        • Latin America
        • Asia-Pacific
        • Join Us
        • GEP Per Se
        • Campus Connect
        TOP EMPLOYER 2025 - USA
        TOP EMPLOYER 2025 - UK
        TOP EMPLOYER 2025 - INDIA
        TOP EMPLOYER 2025 - Costa Rica

        Contact Us

        • Ask Us
        • Request for Proposal
        • Schedule a Demo
        • Share Feeback
        GEP - AMERICA

        GEP in the Americas

        GEP - EUROPE

        GEP in Europe

        GEP - ASIA

        GEP in Asia

        GEP - AFRICA

        GEP in Africa 

        GEP - Middle East

        GEP in the Middle East

        AI-First at GEP

        Sustainability at GEP

    • Solutions  
        • Software 
          • GEP SMART  
          • GEP NEXXE  
          • GEP FINA  
          • GEP QUANTUM  
          • GEP GREEN
        • Strategy 
          • Procurement Consulting  
          • Supply Chain Consulting  
        • Managed Services 
          • Procurement Outsourcing  
          • Supply Chain Outsourcing  

        Software

        GEP SMART

        • Procurement Software
        • Direct Procurement Software
        • Indirect Procurement Software
        • Midsize & High Growth Enterprises

        GEP NEXXE

        • AI-First Supply Chain Management 
        • Supply Chain Visibility and Execution 
        • Supply Chain Planning 
        • Supply Chain Collaboration  

        GEP FINA

        GEP GREEN

        GEP QUANTUM

         

        GEP SMART

        • Procurement Software
        • Direct Procurement Software
        • Indirect Procurement Software
        • Unified Source-to-Pay
        • Source-To-Contract Software
        • Procure-to-Pay
        • GEP SMART for Midsize & High-Growth Enterprises
        • Key Capabilities
        • Spend Analysis
        • Sourcing
        • Contract Lifecycle Management
        • Supplier Lifecycle Management
        • Third-Party Risk Management
        • Purchasing
        • Payments
        • Data Analytics and Reporting
        • Do More With GEP SMART
        • Intake Management & Orchestration
        • Intelligent Category Management
        • Tail Spend Management
        • Cost Data & Analytics (GEP COSTDRIVERS)

        GEP NEXXE

        • AI-First Supply Chain Management
        • Supply Chain Visibility and Execution
        • Logistics Visibility  
        • Inventory and Warehouse Management
        • GEP Multienterprise Collaboration Network
        • Supply Chain Control Tower
        • Field Services  
        • Supply Chain Collaboration & Planning  
        • Supply Chain Planning
        • Purchase Order Collaboration  
        • Forecast Collaboration 
        • Capacity Collaboration  
        • Quality Management Software  
        • Should-Cost Modeling
        • Direct Material Sourcing
        GEP Is a Leader in the 2025 Gartner® Magic Quadrant™ for Source-to-Pay Suites

        GEP Is a Leader in the 2025 Gartner® Magic Quadrant™ for Source-to-Pay Suites

        Read More

        GEP FINA

        • E-Invoice Network
        • E-Invoice Receiving
        • E-Invoice Sending
        • E-Invoicing Compliance
        • Digital Supply Chain
        GEP Is a Leader in the 2025 Gartner® Magic Quadrant™ for Source-to-Pay Suites

        GEP Is a Leader in the 2025 Gartner® Magic Quadrant™ for Source-to-Pay Suites

        Read More

        GEP QUANTUM

        • AI, ML & Automated Technology
        • AI-Powered Data Analytics
        • Cloud Integration
        • Low-Code Application Development
        GEP Is a Leader in the 2025 Gartner® Magic Quadrant™ for Source-to-Pay Suites

        GEP Is a Leader in the 2025 Gartner® Magic Quadrant™ for Source-to-Pay Suites

        Read More

        Strategy

        Unrivaled supply chain and procurement expertise + the transformative power of AI

        Procurement Consulting

        • Procurement Transformation
        • Digital Procurement Transformation
        • Opportunity Assessment
        • M&A Services

        Supply Chain Consulting

        • Environmental, Social and Governance
        • Sustainability Consulting Services
        • Socially Responsible Sourcing
        • Scope 3
        A Procurement Software Platforms Leader — 4 Years Running

        Tariff Resource Center: Strategies and Action Plans 

        Read More

        Procurement Consulting

        • Procurement Transformation
        • Digital Procurement Transformation
        • Opportunity Assessment
        • M & A Services
        • Strategic Cost Management
        • Supply Risk Management
        6 Strategies for CPG Companies To Supercharge Sales and Operations Planning

        6 Strategies for CPG Companies To Supercharge Sales and Operations Planning

        Read More

        Supply Chain Consulting

        • Environmental, Social and Governance
        • Sustainability Consulting Services
        • Socially Responsible Sourcing
        • Supply Chain Strategy
        • Supply Chain Diagnostics
        • Inventory Optimization
        • Network Optimization
        • GEP Total Inventory Management Solution
        Mapping & Reducing Scope 3 Emissions: A Quickstart Guide for Procurement Pros

        10 Practical Steps To Reduce Scope 3 Emissions

        Read More

        Managed Services

        World-class skills, experience and know-how — amplified by the power of AI

        Procurement Outsourcing

        • Source-to-Contract
        • Spend Analysis 
        • Procure-to-Pay
        • Cost Recovery & Invoice Auditing

        Supply Chain Outsourcing

        • Planning & Forecasting
        • Inventory Management
        • Logistics Management
        • Supply Chain Data Management
        GEP Named a Leader in Procurement Outsourcing Services

        GEP Named a Leader in Procurement Outsourcing Services

        Read More

        Procurement Outsourcing

        • Source-to-Contract
        • Spend Analysis
        • Strategic Sourcing
        • Category Management
        • Tail-Spend Management
        • Procurement Support Services
        • Procure-to-Pay
        • Cost Recovery & Invoice Auditing
        • Accounts Payable
        GEP Named a Leader in Procurement Outsourcing Services

        GEP Named a Leader in Procurement Outsourcing Services

        Read More

        Supply Chain Outsourcing

        • Planning & Forecasting
        • Inventory Management
        • Logistics Management
        • Supply Chain Data Management
        • Supply Chain Risk Management
        GEP Named a Leader in Procurement Outsourcing Services

        Expanding the Possibilities for Procurement and Supply Chain Management by Using AI

        Read More
    • Industries  
        • Explore by Industry 

        Explore by Industry

        • Automotive
        • Chemicals
        • Consumer Packaged Goods
        • Energy & Utilities
        • Financial Services
        • Government & Nonprofit
        • Industrial Manufacturing
        • Life Sciences
        • Oil & Gas
        • Private Equity
        • Retail
        • Telecommunications, Media & Technology
        • High-Tech
        • Media & Entertainment
        • Software, Social & Platforms
        • Telecom
        • Travel & Hospitality
    • Knowledge Bank  
        • Explore by Topic 
        • Explore by Type 
        • Global Supply Chain Volatility Index

        Explore by Topic

        • Artificial Intelligence
        • Digital Transformation
        • Software & Technology
        • Strategy & Planning
        • Operations
        • Procurement
        • Sustainability
        • Inflation Strategies
        A Procurement Software Platforms Leader — 4 Years Running

        Tariff Resource Center: Strategies and Action Plans 

        Read More

        Explore by Type

        • White Papers
        • Research Reports
        • Bulletins
        • Case Studies
        • Webcasts
        • Blogs
        • Podcasts
        • Insights From the Top
        • Glossary
        Resilience: Delivering Value Amid Volatility

        Resilience: Delivering Value Amid Volatility

        Read More

        Global Supply Chain Volatility Index

    • Careers
      • Join Us
      • GEP Per Se
      • Campus Connect
    • Partners
       
    • GEP Software ›
      • GEP Software
      • ‹ Back
        • GEP SMART ›
          • GEP SMART
          • ‹ Back
            • Procurement Software
            • Direct Procurement Software ›
              • Direct Procurement Software
              • ‹ Back
                • Bill of Materials Management
                • Data Analytics & Reporting
                • Inventory Management
                • Master Data Management
                • Quality Management
                • Supplier Collaboration Portal
                • Supply Chain Operations
            • Indirect Procurement Software ›
              • Indirect Procurement Software
              • ‹ Back
                • Source-to-Contract
                • Savings Project Management
                • Savings Tracking
                • Guided Buying
                • Procurement Portal
                • Catalog Management
                • Order Processing
                • Invoice Management
            • Unified Source-to-Pay
            • Source-To-Contract Software
            • Procure-to-Pay
            • Midsize & High Growth Enterprises
            • Key Capabilities
            • Spend Analysis
            • Sourcing
            • Contract Lifecycle Management
            • Supplier Lifecycle Management
            • Third-Party Risk Management
            • Purchasing
            • Payments
            • Data Analytics and Reporting
            • Do more with GEP SMART
            • Intake Management & Orchestration
            • Intelligent Category Management
            • Tail Spend Management
            • Cost Data & Analytics (GEP COSTDRIVERS)
        • GEP NEXXE ›
          • GEP NEXXE
          • ‹ Back
            • AI-First Supply Chain Management
            • Supply Chain Visibility and Execution ›
              • Supply Chain Visibility and Execution
              • ‹ Back
                • Inventory and Warehouse Management
                • Control Tower
            • Logistics Visibility
            • Inventory and Warehouse Management
            • GEP Multienterprise Collaboration Network
            • Supply Chain Control Tower
            • Field Services
            • Supply Chain Collaboration & Planning ›
              • Supply Chain Collaboration & Planning
              • ‹ Back
                • Purchase Order Collaboration
                • Quality Collaboration
            • Supply Chain Planning ›
              • Supply Chain Planning
              • ‹ Back
                • Demand Planning
                • Supply Chain Bill of Materials
                • Supply Planning
            • Purchase Order Collaboration
            • Forecast Collaboration
            • Capacity Collaboration
            • Quality Management Software
            • Should-Cost Modeling
            • Direct Material Sourcing
        • GEP FINA ›
          • GEP FINA
          • ‹ Back
            • E-Invoice Network
            • E-Invoice Receiving
            • E-Invoice Sending
            • E-Invoicing Compliance
            • Digital Supply Chain
        • GEP QUANTUM ›
          • GEP QUANTUM
          • ‹ Back
            • AI, ML & Automated Technology
            • AI-Powered Data Analytics
            • Cloud Integration
            • Low-Code Application Development
        • GEP GREEN
        • Innovation ›
          • Innovation
          • ‹ Back
            • Emerging Technologies
            • Native to Cloud
            • Native to Mobile
            • One Unified Platform
            • Security
            • User-Centric Design
    • GEP Strategy ›
      • GEP Strategy
      • ‹ Back
        • Procurement Consulting ›
          • Procurement Consulting
          • ‹ Back
            • Procurement Transformation ›
              • Procurement Transformation
              • ‹ Back
                • Procurement Strategy
                • Org. Design & Implementation
                • Capability Building
                • Change Management
                • Governance & Performance
                • Processes & Policies
                • S2P Operations
                • Sourcing & Category Management
                • Technology
            • Digital Procurement Transformation
            • Opportunity Assessment
            • M&A Services ›
              • M&A Services
              • ‹ Back
                • M&A Clean Room
            • Strategic Cost Management ›
              • Strategic Cost Management
              • ‹ Back
                • Zero-Based Budgeting
            • Supply Chain Risk Management
        • Supply Chain Consulting ›
          • Supply Chain Consulting
          • ‹ Back
            • Environmental, Social and Governance
            • Sustainability Consulting Services
            • Socially Responsible Sourcing
            • Scope 3
            • Demand and Supply Chain Planning
            • Collaborative Planning
            • Source To Contract
            • Procure To Pay
            • Inventory Strategy & Management
            • Operations & Manufacturing Excellence
            • GEP Total Inventory Management Solution
            • Network Strategy & Optimization
            • Warehousing & Transportation Management
    • GEP Managed Services ›
      • GEP Managed Services
      • ‹ Back
        • Procurement Outsourcing ›
          • Procurement Outsourcing
          • ‹ Back
            • Source-to-Contract
            • Spend Analysis
            • Strategic Sourcing ›
              • Strategic Sourcing
              • ‹ Back
                • MRO
                • CAPEX
                • Logistics
                • Packaging
                • IT & Telecom
                • Energy
                • Direct Materials
            • Category Management ›
              • Category Management
              • ‹ Back
                • Contract Management
                • Supplier Performance Management
                • Savings & Compliance Tracking
            • Supply Market Intelligence  
            • Tail-Spend Management Services
            • Procurement Support Services ›
              • Procurement Support Services
              • ‹ Back
                • eSourcing
                • Supplier Performance Management
                • Savings & Compliance Tracking
                • Sourcing Support
            • Procure-to-Pay
            • Cost Recovery & Invoice Auditing
            • Accounts Payable
        • Supply Chain Outsourcing ›
          • Supply Chain Outsourcing
          • ‹ Back
            • Planning & Forecasting
            • Inventory Management
            • Logistics Management
            • Supply Chain Data Management
            • Supply Risk Management
    • Industries ›
      • Industries
      • ‹ Back
        • Automotive
        • Chemicals
        • Consumer Packaged Goods
        • Energy & Utilities
        • Financial Services
        • Government & Nonprofit
        • Industrial Manufacturing
        • Life Sciences
        • Oil & Gas
        • Private Equity
        • Retail
        • Telecommunications, Media & Technology
        • High-Tech
        • Media & Entertainment
        • Software, Social & Platforms
        • Telecom
        • Travel & Hospitality
    • Knowledge Bank ›
      • Knowledge Bank
      • ‹ Back
        • Explore by Topic ›
          • Explore by Topic
          • ‹ Back
            • Artificial Intelligence
            • Digital Transformation
            • Operations
            • Procurement
            • Software & Technology
            • Strategy & Planning
            • Sustainability
            • Inflation Strategies
        • Explore by Type ›
          • Explore by Type
          • ‹ Back
            • Insights From the Top
            • White Papers
            • Research Reports
            • Bulletins
            • Case Studies
            • Webcasts
            • Blogs
            • Podcasts
            • Glossary
        • Global Supply Chain Volatility Index
    • Company ›
      • Company
      • ‹ Back
        • About Us
        • Leadership
        • Customers
        • Partners
        • AI-First at GEP
        • Sustainability at GEP
        • News
        • Events
        • Culture ›
          • Culture
          • ‹ Back
            • GEP Core Values
            • Women@GEP
            • Diversity
            • GEP Cares
        • Mission & Vision
        • Awards & Recognition
        • Contact Us
    • Global Presence ›
      • Global Presence
      • ‹ Back
        • Americas ›
          • Americas
          • ‹ Back
            • English
            • Español
            • Portugués
        • Europe ›
          • Europe
          • ‹ Back
            • English
            • Deutsch
        • Asia-Pacific ›
          • Asia-Pacific
          • ‹ Back
            • English
            • 中文
        • Middle East ›
          • Middle East
          • ‹ Back
            • English
            • العربية
    • Contact Us
    • Careers ›
      • Careers
      • ‹ Back
        • GEP Per Se
        • Campus Connect
    • Language ›
      • Language
      • ‹ Back
        • English
        • Français
        • Español
        • Deutsch
        • Italia
        • Português
        • 简体中文
        • 日本語
    • BLOGS
    • Strategy
    • Technology
    • MIND
     
    •  
    •  
    •  
    •  
    Blog Image

    Why the NPM Attack Is a Wake-Up Call for Software Supply Chains

    • Hundreds of popular JavaScript packages were compromised recently, in a sophisticated attack that spread automatically through the software supply chain.
    • Hackers stole developer credentials to break into corporate infrastructure, using a self-replicating worm to maximize damage.
    • Supply chain teams have to go beyond basic security checks and start rotating credentials, isolating dependencies and monitoring their vendor ecosystem continuously.
       

    October 21, 2025 | Supply Chain Risk Management   5 minutes read

    The software supply chain has long been a security weak point. In September 2025, this risk became catastrophic. A massive attack injected malicious code into hundreds of widely used open-source JavaScript packages, targeting the foundation of modern software development globally.

    The attack exploited the industry's deep trust in open-source code, bypassed traditional security measures and introduced a self-propagating worm into the software build process. This isn’t just a technical problem for IT. It's a critical business risk for every organization that uses software. What can supply chain teams do to mitigate the risk?

    What Is the NPM Supply Chain Attack?

    Node Package Manager (npm) is the world's largest registry for JavaScript code. When developers build applications, they typically pull in thousands of pre-built, open-source "packages" from npm. The problem: every package installed introduces trust in its original author and all the other packages it relies on.

    A software supply chain attack is like compromising a factory that makes brake pads. You inject a defect at the source, so it gets distributed to every downstream user.

    In this attack, threat actors launched a targeted phishing campaign to compromise the accounts of several key npm package maintainers. Once they had control of these trusted accounts, they published malicious versions of incredibly popular utilities. Some get downloaded over 2.6 billion times per week. A single compromised account became a vector for global infection.

    Protect Your Software Supply Chain

    Learn How From Our Expert

    Contact Us

    Tracing the NPM Supply Chain Attack Timeline

    The speed with which the attack propagated itself underscores the narrow window businesses have to detect and respond to modern supply chain threats.

    •  Initial Compromise (September 2025) 

    It started with phishing emails. Hackers targeted npm maintainers with convincing fake login pages. Some even mimicked multi-factor authentication screens. The maintainers had no reason to suspect anything. They entered their credentials, and the attackers had their keys.

    •  Malicious Deployment

    Once inside, the attackers pushed malicious code into at least 18 popular packages. These weren't obscure tools, but the packages millions of developers rely on every day. The bad versions stayed live for just a few hours, but that was enough to potentially hit millions of developers and corporate cloud environments.

    •  The Worm Emerges 

    Researchers discovered a self-replicating worm called "Shai-Hulud" spreading through the npm ecosystem. Unlike a typical attack where someone has to manually push each payload, “Shai-Hulud” reproduced on its own, infecting more packages without anyone directing it.

    •  Rapid Response

    The good news: security teams caught it and cleaned it up fast. Most compromised packages were gone within hours. But here's the problem that kept security experts up at night: from initial breach to global impact took only minutes. Not days. Minutes.

    The Impact: Widespread, Subtle and Far-Reaching

    While the malware's immediate objective was stealing cryptocurrency, the method of attack presents far greater threats, such as:

    •  Credential Theft and Cloud Compromise 

    The malware scanned developer environments for sensitive credentials, including GitHub tokens, npm tokens, SSH keys, and cloud service provider keys (AWS, Google Cloud, Azure). If found, attackers could move from a developer's laptop directly into the company's cloud infrastructure, leading to data theft, ransomware or deletion of production environments.

    •  Self-Propagating Risk

    The worm used stolen credentials to inject code into other packages the compromised developer maintained, creating a self-reinforcing chain reaction. The worm didn't stop at a single infection either. It actively weaponized the victim's development infrastructure for ongoing espionage.

    •  Business Interruption and Compliance 

    If attackers accessed an organization’s personal, financial or regulated data, that organization is required to notify those impacted. The mere presence of compromise can trigger contractual breaches with customers and vendors, resulting in indemnity claims and severe reputational harm.

    •  Supply Chain Vulnerability 

    Every third-party software component introduces potential risk. An attack on a dependency your company doesn't use directly can still compromise applications if one of your vendors uses it.

    Why Basic Hygiene Alone Isn't Enough

    Traditional cybersecurity focuses on scanning known vulnerabilities or viruses. This attack bypassed those defenses by exploiting trust. Attackers stole a trusted person's key and used the legitimate publishing mechanism to distribute malware. This means that:'

    •  Code Was "Clean" on Arrival 

    The malicious packages were published from valid, trusted npm accounts. They would sail through automated checks that verify the publisher's authenticity, not the code's content.

    •  Automation Was the Weapon 

    The attack leveraged the same automation developers rely on, like post install scripts and automatic dependency updates, to ensure the malicious code executed immediately and spread automatically.

    •  Vetting Is Insufficient

    For many organizations, vetting thousands of packages in the npm ecosystem is impossible. You might vet one version of a package, only for the next compromised version to be pulled in by an automated update.

    These factors demand that enterprises now assume that any code pulled into their build environments could be hostile and design their systems to neutralize it.

    Immediate Actions for Supply Chain Security Teams

    Procurement and supply chain professionals must act swiftly and decisively. Some advantageous steps based on isolating threats include:

    •  Enforce Mandatory Credential Rotation

    Immediately rotate all developer credentials, including cloud keys, GitHub tokens, and npm tokens. This is the single most effective way to cut off the worm's ability to propagate.

    •  Audit and Pin Dependency Versions

    Use Software Composition Analysis tools to identify which applications use compromised versions. Then, take measures to prevent automatic pulling of unverified updates.

    •  Block Automatic Scripts by Default 

    Many of these attacks work by running malicious code automatically when a new software component is installed. Use tools that block this behavior from the start.

    •  Isolate Your Build Process in a Sandbox 

    Create a digital "sandbox" for building software. This isolated environment, like a virtual machine, should be walled off from everything that matters: corporate credentials, sensitive parts of your network, and developers' local files. 

    •  Introduce a "Cooling-Off" Period for Updates

    Configure your systems to wait about a week before adopting new package versions. That way, you let the broader developer community find any hidden dangers first. 

    •  Require Phishing-Proof Logins 

    Protect your high-value accounts by requiring phishing-resistant multi-factor authentication (MFA), such as physical security keys. It's one of the most effective ways to shut down an attacker's easiest entry point.

    Build a More Resilient Supply Chain

    Learn How AI-Powered Orchestration Drives Real-Time Risk Management

    Read Now

    A Watershed Moment for Business Risk

    Modern threats like the NPM attack aren't just about breaking into a perimeter. They're about compromising the components you willingly invite in.

    For organizations to remain resilient, they must be proactive in defending against these threats. Procurement, compliance and supply chain teams are now on the front lines, tasked with setting security standards for every piece of software the organization deploys. 

    Discover More: Supply Chain Software

    Implementing Zero Trust, mandating isolation and embracing continuous monitoring are critical steps for companies to guard their software supply chains against the inevitable next attack.
     

     

    Tags: supply chain , Supply Chain Risk Management , IT

    Add Comment +

    GEP Outlook 2025: Procurement & Supply Chain Key Trends, Challenges and Opportunities

    Read More

    FEATURED POST

    ...
    Risk Management

    Act Now or Play Safe? Here’s How to Respond to Tariff Uncertainty

    ...
    Supply Chain Strategy

    The AI Race Isn’t Just About Tech — It’s About Supply Chain Agility

    ...
    Source to Pay

    From Vision to Execution: Why GEP Is a Leader for S2P Suites in Gartner 2024-25 Magic Quadrant

      BLOG CATEGORIES

    • Procurement Strategy
    • Supply Chain Strategy
    • Risk Management
    • Sourcing Strategy
    • Cost Management
    • Supplier Management Strategy
    • Miscellaneous
    • M&A
    • Inventory Management
    • Supply Chain Risk Management
    • Sustainability
    • Digital Supply Chain Transformation

    TAGS

    sustainability
    Procurement Software
    supply chain strategy
    Inflation
    Russia-Ukraine War

    By checking the box below, you consent to GEP using your personal information to send you thought leadership content – such as white papers, research reports, case studies – and other communications. GEP representatives may contact you to provide additional information or answer questions.

    If at any point in time you decide to withdraw your consent, you may unsubscribe by emailing your request to us at privacy@gep.com.

    Please refer to the GEP Privacy Statement to understand how we manage and protect your personal information.

    Terms of Use | Privacy Statement

    SEND US YOUR QUESTION(S)

    Terms of Use | Privacy Statement

    Breadcrumb

    1. HOME
    2. BLOGS
    3. STRATEGY
    4. WHY THE NPM ATTACK IS A WAKE-UP CALL FOR SOFTWARE SUPPLY CHAINS

    Contact Us

      Demo Schedule a live demo of our software
      RFP Request for a business proposal
      Ask Us Send us your question(s)
      Feedback Share your comments and suggestions
           
    STRATEGY
    Strategy
    •   Procurement Consulting
    •   Digital Procurement Transformation
    •   Strategic Cost Management
    •   Opportunity Assessment
    •   Supply Chain Risk Management
    •   Supply Chain Consulting
    •   Supply Chain Strategy
    •   Supply Chain Diagnostics
    •   Inventory Optimization
    •   Procurement Transformation
    •   Sustainability and ESG Consulting
    SOFTWARE
    Software
    •   Procurement Software
    •   Supply Chain Software
    •   Source-to-Contract
    •   Procure-to-Pay
    •   Supply Chain Planning
    •   Supply Chain Collaboration
    •   Supply Chain Visibility & Execution
    •   Supply Chain Control Tower
    •   Should-Cost Modeling
    •   Inventory & Warehouse Management Software
    •   Source-To-Pay Software
    •   Midsize & High Growth Enterprises
    MANAGED SERVICES
    Managed Services
    •   Procurement Outsourcing
    •   Strategic Sourcing
    •   Tail-Spend Management
    •   Category Management
    •   Procurement Support Services
    •   Supply Chain Outsourcing
    •   Supply Chain Planning & Forecasting
    •   Inventory Management
    •   Logistics Management
    COMPANY
    Company
    •   About Us
    •   Leadership
    •   Customers
    •   Sustainability at GEP
    •   Careers
    •   News
    •   Awards
    •   Partners
    •   Contact Us
    Stay Connected

       
      

    Download the GEP GO App

    Stay connected with cutting-edge procurement and supply chain insights – anytime, anywhere.

    app store
    play store
    © Copyright GEP 2025. All rights reserved. Terms of Use | Privacy Statement | Cookie Policy |  | Quality Policy | GEP Logo