
C-SCRM: We’re from the government — and we’re here to help with software supply chain security
Supply chain risk management guidance incoming, like it or not

Supply chain risk management guidance incoming, like it or not

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Here's how risks emerge with third-party software, and why third-party partners are best for validating software security end-to-end

Firing ‘the best of the best’ does not bode well for software security. Will the last to leave please turn off the lights?

Software Bills of Materials could become Software Bills of Mediocrity. But not if we can agree on their real value for software supply chain security.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The Log4Shell vulnerability is considered to be one of the most significant software bugs in recent years, because of its severity, pervasiveness and long-lasting impact on organizations.

It’s super easy to spoof Visual Studio Code extensions. And those spoofed extensions are incredibly hard to detect.

ChatGPT and Copilot are a clear and present danger to software security. Modernize your AppSec approach today

ReversingLabs’ YARA detection rule for Black Basta can help you find this ransomware in your environment.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Machine learning can be a cognitive crutch, causing code vulnerabilities. Use with extreme caution!

Get out in front of new compliance requirements for a competitive advantage. Here's what your software organization needs to know.

Security teams should consider software supply chain risk through a new lens after the latest CircleCI incident.

Learn how your organization can reduce cyber risks (as well as operational workload and tool costs) while ensuring data and file privacy. Plus, explore how your security team can reduce MTTD and prioritize malicious files for triage.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial