
Where GenAI intersects with threat modeling: 3 key benefits for AppSec
Generative AI can ease the burdens of threat modeling — and speed it up. But it's not a panacea. Here's what security teams can realistically expect.

Generative AI can ease the burdens of threat modeling — and speed it up. But it's not a panacea. Here's what security teams can realistically expect.

The new checklist is organized into 13 areas of analysis. Here's what your security team needs to know about the most important points from each area.

There is no foolproof method to identify phony developer accounts — but there are telltale signs. Threat researchers share three.

The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

Here's why the duo results in a perfect storm, key considerations — and expert advice on how engineering and application security teams can tackle the problem.

Here's what you need to know about RL's predictive malware detection.

Two newly discovered extensions on the VS Code Marketplace are designed to steal sensitive information, showing that open source attacks are expanding.

Software complexity is growing — making SBOMs a necessity. But they need to be actionable to manage risk. Here's how to put them to work.

Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.

Understand the state of software supply chain security with key takeaways from recent research and surveys of application security and development pros.

Here's what the RL research team knows about the suspicious SqzrFramework480 campaign, which is still available on the NuGet repository.

Memory safety is one of the most stubborn and dangerous software weaknesses. Here are key insights and takeaways from a new Google report on the issue.

Code bloat is at the root of many security problems. Here's how development teams can bolster application security with more efficient code.

Here’s what we know about the federal government's new software security form — and what needs to change. For one, SBOMs should be required.

Here are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial