
Gartner® CISO Playbook for Commercial SSCS: 3 key insights
Here are the takeaways CISOs and other security leaders should consider for their TPCRM strategies.

Writer, ReversingLabs. Carolynn is a reporter, writer, and researcher in the cybersecurity space. She has written for several publications, such as The Security Ledger and Security Boulevard. She has been involved in podcast and event production, and now produces ConversingLabs, a ReversingLabs podcast. Prior to joining ReversingLabs, Carolynn held communication roles in the non-profit and higher education spaces. Her official title at ReversingLabs is Manager, Content Marketing.
find Carolynn van Arsdale on:

Here are the takeaways CISOs and other security leaders should consider for their TPCRM strategies.

ReversingLabs looked at last year’s Software Supply Chain Security Report in the rear-view mirror. Here’s what RL got right — and wrong.

Here are the guidelines, mandates, frameworks, and goals that have refined software supply chain security policy.

OSS and dev tools are targets as AI risk rises. Learn more in the Software Supply Chain Security Report 2026.

The software supply chain incident highlights how quickly threat actors can turn newly revealed vulnerabilities into widespread attacks.

Software procurement is risky business. Learn why outdated tooling doesn’t cut it — and how modern technologies can provide much-needed transparency.

Understand the difference between the SBOM and xBOM — and how it impacts software supply chain security.

The latest Data Breach Investigations Report puts the focus squarely on third-party risk. Here’s what you need to know.

Software supply chain risks from artificial intelligence and machine learning are getting real. Here are key insights from RL’s new report.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial