
What you missed at RSA Conference 2024: Key trends and takeaways
Here are the highlights that practitioners and leaders should know if they skipped last week's RSAC, the mother of all cybersecurity shows.

Here are the highlights that practitioners and leaders should know if they skipped last week's RSAC, the mother of all cybersecurity shows.

In his “State of the Hack” session at RSA Conference, NSA’s David Luber said attackers are thinking beyond data theft and targeting operational technology. That's why your team needs to look deeper and longer for signs of compromise.

Combined with cloud service providers' CLIs, continuous delivery/continuous integration can pose a threat. Here's why — and how to keep a lid on your secrets.

In a new research note, Forrester analysts explain how the current limitations of AI-enabled SecOps tools keep autonomous security decision making out of reach.

The new Data Breach Investigations Report sounds the alarm over software supply chain security — and calls for higher standards for development organizations.

Software supply chain security (SSCS) remains one of the most popular talk tracks at RSA Conference. Here are the sessions that look most interesting.

This release delivers updates on technological capability, usability and workflow enhancements, as well as automation and integration improvements.

RL announced the Spectra Advanced File Analysis and Malware Detection suite, a strategic update of our malware analysis and threat hunting solutions for advanced file analysis and threat detection. Here’s what you need to know.

Cybersecurity Framework 2.0 includes measures for C-SCRM, a NIST program for improving software risk management. Get key insights from our Webinar.

If you’re a SecOps professional heading to RSA Conference 2024, make your time count by attending these essential talks.

Here's what changes to the National Vulnerability Database mean for vulnerability management — and why you should instead focus on malware and tampering.

The foundation is upgrading the standard for the quantum era, adding ML-readable attestation and more. Here's how it boosts software supply chain security.

Generative AI can ease the burdens of threat modeling — and speed it up. But it's not a panacea. Here's what security teams can realistically expect.

The new checklist is organized into 13 areas of analysis. Here's what your security team needs to know about the most important points from each area.

There is no foolproof method to identify phony developer accounts — but there are telltale signs. Threat researchers share three.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial