
Hidden threats lurk in commercial software: How to manage risk
While open-source risks are not going away, attack trends show third-party commercial software presents the greatest risk to the enterprise.

Director of Content and Editorial at RL. Paul is a reporter, editor and industry analyst with 20 years’ experience covering the cybersecurity space. He is the founder and editor in chief at The Security Ledger, a cybersecurity news website. His writing about cyber security has appeared in publications including Forbes, The Christian Science Monitor, MIT Technology Review, The Economist Intelligence Unit, CIO Magazine, ZDNet and Fortune Small Business. He has appeared on NPR’s Marketplace Tech Report, KPCC AirTalk, Fox News Tech Take, Al Jazeera and The Oprah Show.
find Paul Roberts on:

While open-source risks are not going away, attack trends show third-party commercial software presents the greatest risk to the enterprise.

Four firms have been fined for playing down how the SolarWinds attack impacted them. It’s part of a government push for greater supply chain transparency.

Two recent versions of the Solana web3.js open source library were infected with code to steal private keys, putting crypto platforms and wallets at risk.
.webp&w=3840&q=75)
Researcher Alon Leviev warns that the Microsoft Windows compromise posed risks that were structural — stretching well beyond the specific flaws.
.webp&w=3840&q=75)
In a new ConversingLabs podcast, the independent security researcher talks about his early entry into the field — and his latest connected-car research.

Leaders from the private sector and government called for a rethink of outdated security tools and practices in an age of API-driven services and AI.

The state of supply chain security is broken, and that leaves Black Hat attendees with a sense of urgency — and lots to discuss. Here are two main themes.

In his “State of the Hack” session at RSA Conference, NSA’s David Luber said attackers are thinking beyond data theft and targeting operational technology. That's why your team needs to look deeper and longer for signs of compromise.

The new Data Breach Investigations Report sounds the alarm over software supply chain security — and calls for higher standards for development organizations.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial