.webp&w=3840&q=75)
Application security practices are maturing — but it's a work in progress
While best practices adoption for AppSec is up, many supply chain security problems remain, the OpenSSF SLSA framework survey shows.
.webp&w=3840&q=75)
While best practices adoption for AppSec is up, many supply chain security problems remain, the OpenSSF SLSA framework survey shows.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

GitHub just got a little safer, by finally forcing users into two-factor authentication. What took you so long, Microsoft?

ReversingLabs is giving dev and app sec teams something new: broader visibility into software supply chain risks — and data-driven prioritization to automatically suppress third-party secrets and other false positive results.

The recent hacks at CircleCI and other organizations show that your software supply chain may be a grab bag of software secrets. Only an end-to-end security approach can solve the problem.

Why you need to upgrade to software supply chain security: Adversaries can compromise your organization without comprehensive malware identification.

Here are the key takeaways from the Colour-Blind remote access trojan, with insights from supply chain security experts

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Understanding supply chain security is critical in a software-driven society. Here's an overview of our upcoming book.

Teams are mired in CVEs, the NVD (which is fed by CVE data), and the CVSS. Experts explain why it's time to modernize.

In a first, the Biden administration will hold software developers accountable for vulnerabilities. Naturally, it’s dividing opinions

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Why was an engineer allowed to access critical keys from a home computer? "DevOops."

Modern software development is a primary target for supply chain attacks. Here's why traditional application security testing alone is not up to the job.

SBOM automation is no longer just a nice-to-have — it's an absolute necessity.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial