
Why 'security as by-product’ can't replace controls
Built-in security can play a role — and fits with the Secure by Design concept — but robust security controls remain essential.

Built-in security can play a role — and fits with the Secure by Design concept — but robust security controls remain essential.

Attack surface management (ASM) isn’t just another buzzword. It represents a fundamental shift in security strategy with risk on the rise.

Discover how Command Zero and ReversingLabs integrate to speed SOC investigations, cut false positives, and deliver high‑fidelity cyber intelligence.

A malicious Model Context Protocol package was found in the wild last week. Here are lessons from the compromise of the AI interface tool.

ReversingLabs’ Advanced Search is a powerful feature that can gather related samples for threat hunting in your environment. Here's how.

Funding of the OSS ecosystem has reached a crisis as threat actors increasingly target weaknesses in infrastructure.

Here's what you need to know about the discovery of the first self-replicating npm worm, which compromised packages with cloud token-stealing malware.

While security defenders welcomed the new vulnerability-validation tool, others stress it can be just as useful for would-be attackers.

As the development community chalks up the npm worm as just another bad day, bigger questions remain about the software supply chain ecosystem.

AI coding and other modern development practices mean flawed code will continue to ship. Here are key recommendations for managing software risk.

The new guidance would raise the bar for software vendors, who will need to ensure the SBOMs they generate are more detailed and machine-readable.

If you train ML models, they can learn to write more secure code. But the quality of the training data is only as good as your AppSec tooling.

CSA’s AI Controls Matrix can help development and AppSec teams distill priorities for securing the AI software supply chain.

The new procurement tool seeks to strengthen third-party software risk management (TPSRM). But the process is manual and cumbersome.

Learn how ActiveState and ReversingLabs integration automates secure component sourcing, secure software releases, remediation guidance, and policy enforcement.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial