
The state of secrets security: 7 action items for better managing risk
The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

Freelance technology writer. John's work has appeared in the The Boston Globe and Boston Herald, as well as CFO, CIO, CSO, and Inc. magazines. He is a former managing editor of the Boston Business Journal and Boston Phoenix, as well as a staff writer for Government Security News.
find John P. Mello Jr. on:

The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

Memory safety is one of the most stubborn and dangerous software weaknesses. Here are key insights and takeaways from a new Google report on the issue.

Here are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.

NIST's Cybersecurity Framework 2.0 has been released, complete with a new focus on software supply chain security. Here are the key takeaways for your team.

The National Institute of Standards and Technology has beefed up its guidelines for securing CI/CD environments. Are you ready to bulk up your program?

Know the key challenges with software bills of materials, how tooling affects their usefulness — and how to make them actionable for better supply chain security.

Here's what development and application security teams need to know about using attack trees in combination with threat modeling to lock down their software.

"The Growing Complexity of Securing the Software Supply Chain" report highlights key challenges for application security teams. Here's what you need to know.

2023 was a big year for software security. Here are the key lessons from last year's major attacks to learn from.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial