
Commercial software risk: New controls required
Legacy strategies and tooling can’t manage today’s software threats. Here’s why binary analysis is necessary.

Freelance writer. Ericka Chickowski's award-winning writing on business and technology have appeared in dozens of trade and consumer magazines, including Entrepreneur, Consumers Digest, Channel Insider, CIO Insight, Dark Reading, DevOps.com and InformationWeek. She's made it her specialty to explain in plain English how technology trends affect real people.
find Ericka Chickowski on:

Legacy strategies and tooling can’t manage today’s software threats. Here’s why binary analysis is necessary.

Gaining visibility into supply chain threats — and adding controls for software risk — are essential to insurability.

Development is in freefall toward software entropy and insecurity. Can spec-driven development help?

CSA’s AI Controls Matrix can help development and AppSec teams distill priorities for securing the AI software supply chain.

Scott Culp’s formulation still holds true — though some additions are needed that account for software supply chain security.

Leading firms are using DevEx to achieve application security gains at speed. Here's how it works — and how to get started.

The Pentagon's Software Fast Track program steps up SCRM via procurement. Here's what you need to know.

CycloneDX 1.6's ML-BOM, SaaSBOM, and CBOM are non-negotiable visibility requirements in the software supply chain security era.

While the state of cybersecurity careers is confusing, key trends are driving companies to think big-picture — and outside of traditional roles.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial