RL Blog
Threat modeling and binary analysis: Supercharge your risk strategy
October 16, 2024

Threat modeling and binary analysis: Supercharge your risk strategy

Chris Romeo shares five key ways to merge modeling with modern software supply chain security — and improve your software risk management in the process.

Read More about Threat modeling and binary analysis: Supercharge your risk strategy
Threat modeling and binary analysis: Supercharge your risk strategy
lanes merging sign
October 16, 2024

Threat modeling and binary analysis: Supercharge your risk strategy

Chris Romeo shares five key ways to merge modeling with modern software supply chain security — and improve your software risk management in the process.

Read More about Threat modeling and binary analysis: Supercharge your risk strategy
Threat modeling and binary analysis: Supercharge your risk strategy
american football players colliding
October 15, 2024

AI and cybersecurity: Modernize your SecOps to tackle today's threats

Here are highlights from Caleb Sima's recent BSides and RVAsec talks — and expert insights on how AI can help deal with today's threats head-on.

Read More about AI and cybersecurity: Modernize your SecOps to tackle today's threats
AI and cybersecurity: Modernize your SecOps to tackle today's threats
person rolling five dice
October 9, 2024

5 commercial software attacks — and what you can learn from them

Don't just roll the dice with commercial software risk. Here are key lessons from recent attacks for your security team.

Read More about 5 commercial software attacks — and what you can learn from them
5 commercial software attacks — and what you can learn from them
shadowy figures sitting at monitors in data center
October 8, 2024

Do More With Your SOAR

Leveraging ReversingLabs File Enrichment in Your SOC.

Read More about Do More With Your SOAR
Do More With Your SOAR
closeup of the word acquire in a dictionary
October 3, 2024

Get Ahead of CISA's New Software Security Acquisition Requirements

How Spectra Assure helps accelerate compliance with new requirements.

Read More about Get Ahead of CISA's New Software Security Acquisition Requirements
Get Ahead of CISA's New Software Security Acquisition Requirements
three fit men working out with kettlebells
October 2, 2024

The best cybersecurity certifications to level up your skills

With the threat landscape shifting, boosting your market value requires choosing the right certs. Here's what you need to know.

Read More about The best cybersecurity certifications to level up your skills
The best cybersecurity certifications to level up your skills
hacker podcast sam curry title slide
October 1, 2024

When hackers get hacked: Sam Curry on his career — and his latest research

In a new ConversingLabs podcast, the independent security researcher talks about his early entry into the field — and his latest connected-car research.

Read More about When hackers get hacked: Sam Curry on his career — and his latest research
When hackers get hacked: Sam Curry on his career — and his latest research
man facing dilemma left and right arrows
September 26, 2024

‘Good, fast, cheap... Pick two’: Software quality dilemma forces risky decisions

When developing software there are three options: good, fast, and cheap. But you can only pick two. Here's what that reality means for commercial software risk.

Read More about ‘Good, fast, cheap... Pick two’: Software quality dilemma forces risky decisions
‘Good, fast, cheap... Pick two’: Software quality dilemma forces risky decisions
opencti and reversinglabs logos in plus sign
September 25, 2024

Enhance Your SOC Efficiency With ReversingLabs CTI Integrations

RL File Enrichment improves OPEN-CTI's threat detection and response capabilities.

Read More about Enhance Your SOC Efficiency With ReversingLabs CTI Integrations
Enhance Your SOC Efficiency With ReversingLabs CTI Integrations
tim brown interview
September 25, 2024

Transparency and Trust: SolarWinds CISO on Securing the Software Supply Chain

How SolarWinds uses Spectra Assure in its path to be exemplary.

Read More about Transparency and Trust: SolarWinds CISO on Securing the Software Supply Chain
Transparency and Trust: SolarWinds CISO on Securing the Software Supply Chain
wooden block letters scattered with the word chaos spelled in the center
September 24, 2024

Modernize your chaos engineering with commercial software transparency

By leveraging modern supply chain security, you can develop better chaos engineering with deeper visibility into all software. Here are key considerations.

Read More about Modernize your chaos engineering with commercial software transparency
Modernize your chaos engineering with commercial software transparency
number 4 on brick wall
September 18, 2024

CISA SBOM-a-rama: 4 key takeaways for software security teams

The Cybersecurity and Infrastructure Security Agency held its semiannual workshop on software bills of materials recently. Here's what you need to know.

Read More about CISA SBOM-a-rama: 4 key takeaways for software security teams
CISA SBOM-a-rama: 4 key takeaways for software security teams
person holding up a check mark
September 17, 2024

Go beyond the checkbox: How software bills of materials can manage risk

SBOMs are a good start — but modern software supply chain security tooling is needed to make them effective, experts say.

Read More about Go beyond the checkbox: How software bills of materials can manage risk
Go beyond the checkbox: How software bills of materials can manage risk
podcast title card beau woods
September 12, 2024

A long history: What’s next for software bills of materials is what matters

Beau Woods discusses the history of the SBOM, from its humble beginnings to its use today — and efforts to modernize it. Here are key highlights from the interview.

Read More about A long history: What’s next for software bills of materials is what matters
A long history: What’s next for software bills of materials is what matters
Previous1...161718...55Next

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu