
CI/CD pipelines and the cloud: Are your development secrets at risk?
Combined with cloud service providers' CLIs, continuous delivery/continuous integration can pose a threat. Here's why — and how to keep a lid on your secrets.

Freelance technology writer. John's work has appeared in the The Boston Globe and Boston Herald, as well as CFO, CIO, CSO, and Inc. magazines. He is a former managing editor of the Boston Business Journal and Boston Phoenix, as well as a staff writer for Government Security News.
find John P. Mello Jr. on:

Combined with cloud service providers' CLIs, continuous delivery/continuous integration can pose a threat. Here's why — and how to keep a lid on your secrets.

The foundation is upgrading the standard for the quantum era, adding ML-readable attestation and more. Here's how it boosts software supply chain security.

The new checklist is organized into 13 areas of analysis. Here's what your security team needs to know about the most important points from each area.

The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

Memory safety is one of the most stubborn and dangerous software weaknesses. Here are key insights and takeaways from a new Google report on the issue.

Here are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.

NIST's Cybersecurity Framework 2.0 has been released, complete with a new focus on software supply chain security. Here are the key takeaways for your team.

The National Institute of Standards and Technology has beefed up its guidelines for securing CI/CD environments. Are you ready to bulk up your program?

Know the key challenges with software bills of materials, how tooling affects their usefulness — and how to make them actionable for better supply chain security.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial