RL Blog
shift and ctrl buttons on keyboard
March 18, 2025

EPSS is not foolproof: Shift your AppSec beyond vulnerabilities

The Exploit Prediction Scoring System is useful, but limited. Here's why your application security strategy needs an upgrade.

Read More about EPSS is not foolproof: Shift your AppSec beyond vulnerabilities
EPSS is not foolproof: Shift your AppSec beyond vulnerabilities
shield hologram in a room of servers
March 13, 2025

How to Assess VMs Prior to Deployment with Spectra Assure

Leveraging binary analysis, Spectra Assure uses a pre-deployment, static approach for virtual machine security, which is faster and more thorough. Here's how it works.

Read More about How to Assess VMs Prior to Deployment with Spectra Assure
How to Assess VMs Prior to Deployment with Spectra Assure
distraught man holding head with drawings coming out from his head
March 13, 2025

OWASP supply chain security cheat sheet: 5 key action items

The complexity of today's software development makes supply chain security essential. This new cheat sheet is a great place to start.

Read More about OWASP supply chain security cheat sheet: 5 key action items
OWASP supply chain security cheat sheet: 5 key action items
faceless man in hooded jacket standing in the rain
March 12, 2025

Hidden threats lurk in commercial software: How to manage risk

While open-source risks are not going away, attack trends show third-party commercial software presents the greatest risk to the enterprise.

Read More about Hidden threats lurk in commercial software: How to manage risk
Hidden threats lurk in commercial software: How to manage risk
woman buckling into seatbelt
March 11, 2025

Generative AI software development boosts productivity — and risk

The promise of higher development output is prompting rapid adoption of AI coding tools, but AppSec teams are in the hot seat with rising risk. Buckle up!

Read More about Generative AI software development boosts productivity — and risk
Generative AI software development boosts productivity — and risk
chessboard with two figures fighting between the set up pieces
March 6, 2025

How data science in cybersecurity can cut through the fog of war

Orchestrating the heavy lifting of data management and analytics is easier said than done. Here are four key pillars for improving security outcomes.

Read More about How data science in cybersecurity can cut through the fog of war
How data science in cybersecurity can cut through the fog of war
shipping cargo containers
March 5, 2025

7 container security best practices

With the rise of attacks on the supply chain and threats from AI, securing containers requires a modern strategy. Here are key considerations.

Read More about 7 container security best practices
7 container security best practices
man looking worried
March 4, 2025

The top software development security challenges: The AI's have it

From the AppSec testing gap to data privacy, AI is increasing security worries. Here are key takeaways from a survey of development leaders.

Read More about The top software development security challenges: The AI's have it
The top software development security challenges: The AI's have it
retro toy robot
February 27, 2025

Agentic AI and development: How to get ahead of rising risk

Software teams will need to get on board with agentic AI. But AppSec teams need new visibility and controls for the SDLC.

Read More about Agentic AI and development: How to get ahead of rising risk
Agentic AI and development: How to get ahead of rising risk
man wearing suit and red blindfold
February 26, 2025

Silent breaches and supply chain exploits: 5 lessons for cyber-teams

Hidden weaknesses and blind trust magnify the risks from third parties, a new report finds. Here are key takeaways for your cybersecurity team.

Read More about Silent breaches and supply chain exploits: 5 lessons for cyber-teams
Silent breaches and supply chain exploits: 5 lessons for cyber-teams
clapboard in front of green screen
February 25, 2025

Go beyond vulnerabilities for your AppSec: Here's why it's essential

Two new reports — and the rise of AI and supply chain attacks — make it clear organizations must look beyond vulnerability mitigation alone. Take action now.

Read More about Go beyond vulnerabilities for your AppSec: Here's why it's essential
Go beyond vulnerabilities for your AppSec: Here's why it's essential
black rubber ducky leaning forward
February 24, 2025

SCA Is No Longer Relevant: Insights From the Founder of Black Duck

The future of application security requires a shift beyond traditional tools.

Read More about SCA Is No Longer Relevant: Insights From the Founder of Black Duck
SCA Is No Longer Relevant: Insights From the Founder of Black Duck
plus sign with reversing labs logo and artifactory logo
February 20, 2025

Spectra Assure Artifactory Integration: Securing Software Development

ReversingLabs integration with JFrog Artifactory provides a seamless way to scan all software artifact types, protecting critical software supply chains.

Read More about Spectra Assure Artifactory Integration: Securing Software Development
Spectra Assure Artifactory Integration: Securing Software Development
brass number 8 hanging on brick wall
February 19, 2025

8 key software security fails to avoid

Security best practices can help, but it’s the bad practices that will expose your company to software risk. Here are the ones to avoid at all cost.

Read More about 8 key software security fails to avoid
8 key software security fails to avoid
line of rubber duckies
February 18, 2025

Secure AI deployment is complicated: 5 ways to get your ducks in a row

A Cloud Security Alliance report explores new requirements for the tools, processes, and roles that secure AI-driven systems. Here are key takeaways.

Read More about Secure AI deployment is complicated: 5 ways to get your ducks in a row
Secure AI deployment is complicated: 5 ways to get your ducks in a row
Previous1...121314...55Next

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu