
OWASP looks to future-proof software bills of materials with CycloneDX 1.6
The foundation is upgrading the standard for the quantum era, adding ML-readable attestation and more. Here's how it boosts software supply chain security.

Freelance technology writer. John's work has appeared in the The Boston Globe and Boston Herald, as well as CFO, CIO, CSO, and Inc. magazines. He is a former managing editor of the Boston Business Journal and Boston Phoenix, as well as a staff writer for Government Security News.
find John P. Mello Jr. on:

The foundation is upgrading the standard for the quantum era, adding ML-readable attestation and more. Here's how it boosts software supply chain security.

The new checklist is organized into 13 areas of analysis. Here's what your security team needs to know about the most important points from each area.

The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

Memory safety is one of the most stubborn and dangerous software weaknesses. Here are key insights and takeaways from a new Google report on the issue.

Here are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.

NIST's Cybersecurity Framework 2.0 has been released, complete with a new focus on software supply chain security. Here are the key takeaways for your team.

The National Institute of Standards and Technology has beefed up its guidelines for securing CI/CD environments. Are you ready to bulk up your program?

Know the key challenges with software bills of materials, how tooling affects their usefulness — and how to make them actionable for better supply chain security.

Here's what development and application security teams need to know about using attack trees in combination with threat modeling to lock down their software.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial