
Supply chain risk makes software stack visibility essential
IT GRC Forum expert panel: Get back to basics and put your SBOMs to work for better software security. Here are key takeaways.

Freelance technology writer. John's work has appeared in the The Boston Globe and Boston Herald, as well as CFO, CIO, CSO, and Inc. magazines. He is a former managing editor of the Boston Business Journal and Boston Phoenix, as well as a staff writer for Government Security News.
find John P. Mello Jr. on:

IT GRC Forum expert panel: Get back to basics and put your SBOMs to work for better software security. Here are key takeaways.

The Post Quantum Cryptography program aims to bolster key components such as public-key algorithms. Here's a full rundown.

Here's what you need to know about why the Log4j flaw, Log4Shell, remains a threat — and how to protect your organization with a modern software security approach.

Traditional security tools are no match for the modern threat landscape. Here are four areas where you can take action.

A flaw in Puppet Forge on GitHub could have led to a supply chain disaster matching the scope of the attack on SolarWinds. Here are the key takeaways.

AppSec risk managers and development teams: Take note of the key takeaways — and expert analysis.

Secure by Design's cousin can help make software more secure out of the box by adding guardrails to development. Here's how it helps — and its limitations.

The aim is to build a unifying framework incorporating existing SBOM data models, including CSAF, CycloneDX, OpenVEX, and SPDX. Experts weigh in with key insights.

Self-service portals for developers can help organizations overcome challenges to getting up and running with CISA's software security initiative.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial