
The state of secrets security: 7 action items for better managing risk
The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

Here's why the duo results in a perfect storm, key considerations — and expert advice on how engineering and application security teams can tackle the problem.

Here's what you need to know about RL's predictive malware detection.

Two newly discovered extensions on the VS Code Marketplace are designed to steal sensitive information, showing that open source attacks are expanding.

Software complexity is growing — making SBOMs a necessity. But they need to be actionable to manage risk. Here's how to put them to work.

Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.

Understand the state of software supply chain security with key takeaways from recent research and surveys of application security and development pros.

Here's what the RL research team knows about the suspicious SqzrFramework480 campaign, which is still available on the NuGet repository.

Memory safety is one of the most stubborn and dangerous software weaknesses. Here are key insights and takeaways from a new Google report on the issue.

Code bloat is at the root of many security problems. Here's how development teams can bolster application security with more efficient code.

Here’s what we know about the federal government's new software security form — and what needs to change. For one, SBOMs should be required.

Here are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.

RL has discovered a campaign using PyPI packages posing as open-source libraries to steal BIP39 mnemonic phrases, which are used for wallet recovery.

The FDA now requires medical device manufacturers to produce a software bill of materials to ensure supply chain security. Here’s what you need to know.

There are many reasons to consider a career in AppSec, but one stands out: Software supply attacks are creating job security and opportunity.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial