
5 key takeaways from ESG's software supply chain complexity report
"The Growing Complexity of Securing the Software Supply Chain" report highlights key challenges for application security teams. Here's what you need to know.

Freelance technology writer. John's work has appeared in the The Boston Globe and Boston Herald, as well as CFO, CIO, CSO, and Inc. magazines. He is a former managing editor of the Boston Business Journal and Boston Phoenix, as well as a staff writer for Government Security News.
find John P. Mello Jr. on:

"The Growing Complexity of Securing the Software Supply Chain" report highlights key challenges for application security teams. Here's what you need to know.

2023 was a big year for software security. Here are the key lessons from last year's major attacks to learn from.

Let’s band together for the love of security

Here's what you need to know about Zoom's Vulnerability Impact Scoring System, how it compares to EPSS — and how it can advance your application security.

Here's why organizations are struggling with TPCRM — and how to develop an effective program.

The TeamCity incident is similar to SunBurst, which was behind the attack on SolarWinds. But there are differences. Here are tips to help secure your software pipeline.

More than 1,500 tokens were exposed, leaving millions of AI models and datasets vulnerable. Here's what your security team can learn from the compromise.

U.K. and U.S. cyber-watchdogs say to start with Secure by Design — but don't stop there. Here are key takeaways from their new guidelines.

While AI is mostly seen as opening a new front in the threat landscape, it will also be tapped to fight back with advanced threat hunting and more.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial