
Hacker Summer Camp: Reboot needed to tackle software supply chain threats
Leaders from the private sector and government called for a rethink of outdated security tools and practices in an age of API-driven services and AI.

Director of Content and Editorial at RL. Paul is a reporter, editor and industry analyst with 20 years’ experience covering the cybersecurity space. He is the founder and editor in chief at The Security Ledger, a cybersecurity news website. His writing about cyber security has appeared in publications including Forbes, The Christian Science Monitor, MIT Technology Review, The Economist Intelligence Unit, CIO Magazine, ZDNet and Fortune Small Business. He has appeared on NPR’s Marketplace Tech Report, KPCC AirTalk, Fox News Tech Take, Al Jazeera and The Oprah Show.
find Paul Roberts on:

Leaders from the private sector and government called for a rethink of outdated security tools and practices in an age of API-driven services and AI.

The state of supply chain security is broken, and that leaves Black Hat attendees with a sense of urgency — and lots to discuss. Here are two main themes.

In his “State of the Hack” session at RSA Conference, NSA’s David Luber said attackers are thinking beyond data theft and targeting operational technology. That's why your team needs to look deeper and longer for signs of compromise.

The new Data Breach Investigations Report sounds the alarm over software supply chain security — and calls for higher standards for development organizations.

There is no foolproof method to identify phony developer accounts — but there are telltale signs. Threat researchers share three.

Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.

Here’s what we know about the federal government's new software security form — and what needs to change. For one, SBOMs should be required.

This latest incident underscores the continuing risks to organizations posed by both third-party software and leaks of development secrets.

Here's what we know about the automaker's latest secrets breach — and lessons your security team can draw from it.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial