
Mobile and third-party risk: How legacy testing leaves you exposed
Without modern application security tooling, including binary analysis, the third-party risk management puzzle is incomplete.

Freelance technology writer. John's work has appeared in the The Boston Globe and Boston Herald, as well as CFO, CIO, CSO, and Inc. magazines. He is a former managing editor of the Boston Business Journal and Boston Phoenix, as well as a staff writer for Government Security News.
find John P. Mello Jr. on:

Without modern application security tooling, including binary analysis, the third-party risk management puzzle is incomplete.

The CVE's challenges mean it's time to get off the vulnerability hamster wheel and modernize your risk program.

Quantum random number generators can make software — including software development secrets — more secure. Here's how it works.

The Open Source Secure Baseline provides a framework for securing OSS development — but it could breed complacency.

Risk is rising across the software supply chain while visibility remains low, making TPCRM challenging. Here's what you need to know.

The complexity of today's software development makes supply chain security essential. This new cheat sheet is a great place to start.

The promise of higher development output is prompting rapid adoption of AI coding tools, but AppSec teams are in the hot seat with rising risk. Buckle up!

From the AppSec testing gap to data privacy, AI is increasing security worries. Here are key takeaways from a survey of development leaders.

Hidden weaknesses and blind trust magnify the risks from third parties, a new report finds. Here are key takeaways for your cybersecurity team.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial