
Trustworthy AI is key: 9 key threat categories
CSA’s AI Controls Matrix can help development and AppSec teams distill priorities for securing the AI software supply chain.

Freelance writer. Ericka Chickowski's award-winning writing on business and technology have appeared in dozens of trade and consumer magazines, including Entrepreneur, Consumers Digest, Channel Insider, CIO Insight, Dark Reading, DevOps.com and InformationWeek. She's made it her specialty to explain in plain English how technology trends affect real people.
find Ericka Chickowski on:

CSA’s AI Controls Matrix can help development and AppSec teams distill priorities for securing the AI software supply chain.

Scott Culp’s formulation still holds true — though some additions are needed that account for software supply chain security.

Leading firms are using DevEx to achieve application security gains at speed. Here's how it works — and how to get started.

The Pentagon's Software Fast Track program steps up SCRM via procurement. Here's what you need to know.

CycloneDX 1.6's ML-BOM, SaaSBOM, and CBOM are non-negotiable visibility requirements in the software supply chain security era.

While the state of cybersecurity careers is confusing, key trends are driving companies to think big-picture — and outside of traditional roles.

Orchestrating the heavy lifting of data management and analytics is easier said than done. Here are four key pillars for improving security outcomes.

Software teams will need to get on board with agentic AI. But AppSec teams need new visibility and controls for the SDLC.

The agency's new IT Sector-Specific Goals (SSGs) for application security aim to keep Secure by Design going strong. Here are the top action items.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial