ReversingLabs Blog

Ericka Chickowski

Ericka Chickowski
Award-winning freelance writer. Ericka Chickowski's writings on business and technology have appeared in dozens of trade and consumer magazines, including Entrepreneur, Consumers Digest, Channel Insider, CIO Insight, Dark Reading, DevOps.com and InformationWeek. She's made it her specialty to explain in plain English how technology trends affect real people.

Recent Posts from Ericka Chickowski

June 5, 2023

5 AI threats keeping SOC teams up at night

Here are five AI threats that your security operations team should be planning and budgeting for if you want to stay ahead of the emerging threat with AI.
May 16, 2023

7 obstacles to SBOM success

The path to success for software bills of materials is riddled with hurdles. Experts explain key factors that could threaten your SBOM investments.
May 2, 2023

How to operationalize SBOMs for incident response

Learn why Software Bills of Materials are essential for cybersecurity incident response — and how to put them to work.
April 11, 2023

Why 'shift left' is now a dirty term in some security circles

Here's why some security practitioners question the term "shift left" — and what they think application security teams should focus on instead.
March 28, 2023

How bulk pull requests help scale open source bug fixes

Common flaws are duplicated all across the software supply chain. Here's how security researchers want to automate fixes.
March 7, 2023

App sec is addicted to vulnerability reporting: Why supply chain security requires evolution

Here's what you need to know about app sec's addiction to vulnerabilities — and why application security needs to evolve to take on supply chain security.
February 15, 2023

Less talk, more action: High hopes for CISA's C-SCRM software supply chain security office

CISA's C-SCRM turns a page on a busy 2022 for federal supply chain directives and guidance. Will it move the needle on software supply chain security?
November 1, 2022

8 CI/CD best practices: Secure your software development pipeline

Don't neutralize CI/CD business gains by failing to account for risk. Here are eight best practices to ensure your software development pipeline is secure.
October 27, 2022

OWASP at a crossroads: Founder Mark Curphey's call for relevance in the age of DevSecOps

After two decades of raising awareness about the big problems in application security, the Open Web Application Security Project (OWASP) stands at a crossroads. Founder Mark Curphey outlines his manifesto for modernization.

SUBSCRIBE

Get the Best of the ReversingLabs newsletter delivered to your in-box weekly to stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ConversingLabs Cafe: Chris Romeo on the state of application security ConversingLabs Cafe: Chris Romeo on the state of application security
Conversations About Threat Hunting and Software Supply Chain Security
Behaviors & Diffs: Better Together for Software Supply Chain Security Behaviors & Diffs: Better Together for Software Supply Chain Security
Glassboard conversations with ReversingLabs Field CISO Matt Rose
Software Package Deconstruction: Deconstructing UPS Ship Manager Software Package Deconstruction: Deconstructing UPS Ship Manager
Analyzing Risks To Your Software Supply Chain