
SBOM Automation: The next big step in risk management
SBOM automation is no longer just a nice-to-have — it's an absolute necessity.
Read More about SBOM Automation: The next big step in risk managementSBOM automation is no longer just a nice-to-have — it's an absolute necessity.
Read More about SBOM Automation: The next big step in risk managementThe CircleCI breach reveals a bigger story on secrets. Matt Rose and Chris Wilder discuss lessons learned in this webinar
Read More about Lessons learned from the CircleCI secrets breachThe new CISA office could make a big difference — and even lead to a new discipline dedicated to software supply chain security
Read More about How C-SCRM could fill the gaps on supply chain securityThe Circle CI breach and other recent hacks expose why the secrets problem is so prolific. Here's what you need to know.
Read More about Why devs and repos spill secretsWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: U.S. Special Ops Command server exposed emails, phishing campaign hits npmReversingLabs researchers discovered dozens of malicious packages on Python Package Index that mimic popular libraries
Read More about Developers beware: Imposter HTTP libraries lurk on PyPIThis is not a drill: Denis Pushkarev has big debts — and his code is EVERYWHERE
Read More about Core-JS: Beware hidden dependencies from indebted Russian developersModeled after MITRE ATT&CK, OSC&R aims to improve software supply chain security. Experts share its hits — and misses.
Read More about OSC&R targets software supply chain attacksReversingLabs’ YARA detection rule for Lorenz can help you find this ransomware in your environment.
Read More about From the Labs: YARA Rule for Detecting LorenzWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: Russian hackers targeted U.S. gas and electric, malicious PyPI packages show prowessCISA's C-SCRM turns a page on a busy year for federal software supply chain security directives and guidance. Will it move the needle?
Read More about Less talk, more action: High hopes for CISA's new C-SCRM officeBeep, boop; hope, hype: Generative AI isn't ready for prime time. So don't play games with your software development
Read More about Lessons from ChatGPT, Bing AI, Bard and Copilot: Chatty AI is just a toySoftware teams face growing supply chain complexity and threats. Here's why your application security team needs to go beyond open source and vulnerabilities.
Read More about SCA is necessary, but AppSec must evolve to tackle software supply chain securityForrester has assessed that software composition analysis (SCA) has grown into an established market. Here are the highlights for teams tasked with software supply chain security
Read More about Software composition analysis and the evolution of application securityThe Forrester Software Composition Analysis Landscape, Q1 2023 report provides a competitive analysis of SCA tools. Here's how they deliver (and miss) on software supply chain security
Read More about The SCA tools landscape and what it means to software supply chain securityGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial