
ConversingLabs highlights: RSA Conference spotlights software supply chain, critical infrastructure risk
The RSA Conference brings some of the brightest minds in information security together in one place.

The RSA Conference brings some of the brightest minds in information security together in one place.


Omer Gil and Daniel Krivelevich outlined the top CI/CD security risks at RSA Conference 2022. Here's what your software security team needs to know.

A survey of more than 300 technology professionals found widespread concern about supply chain attacks, but only sporadic efforts to detect such attacks.

ReversingLabs delivered a game-show style review of its survey on software supply chain security at RSA Conference. Here are the questions and answers.

MITRE’s System of Trust framework is aiming to standardize how software supply chain security is assessed. MITRE's Robert Martin explains.

It's two years in, and COVID is still threatening to steal RSA Conference's mojo. But for those willing to brave Moscone in San Francisco (and those attending virtually), you won’t be disappointed. Here are our picks for must-see talks.

The growing number of software supply chain attacks is putting pressure on validation of software integrity and authenticity.

Python packages can contain sensitive information. Here's how software development teams can keep secrets secret

Package repository content can be different from source code repository content. Here's what your software team needs to know.

Software supply chain attacks are a top concern. But tools for monitoring and stopping them lags. Meet ReversingLabs' new platform: secure.software.

Chief Information Security Officers from energy, finance, and retail sectors reflect on new security challenges–and CISO burnout.

ReversingLabs’ team of threat analysts have released new YARA detection rules for malware wipers discovered targeting Ukraine. We break them down for you here.

One year ago today, the White House released an executive order regarding improving the nation’s cybersecurity (a.k.a. EO 14028). Here's where things stand.

Research by ReversingLabs suggests that dependency confusion attacks on npm repositories have been used to compromise German firms - exposing an apparent red team exercise.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial