
Log4j: Why your organization needs to embrace software bills of materials
This widespread vulnerability is an object lesson for why software development organizations and their customers should be using SBOMs.

This widespread vulnerability is an object lesson for why software development organizations and their customers should be using SBOMs.

Operationalizing high fidelity threat intelligence can help your organization short circuit emerging ransomware attacks. Here’s how.

No doubt about it, the way malicious actors attack their targets through software is changing.

Find hidden software risks and prevent supply chain attacks

It’s with tremendous excitement that I’m able to speak to our customers, partners and employees about the recent investment in ReversingLabs led by Crosspoint Capital Partners.

This blog discusses the process used to find another NPM package that steals saved Chrome browser passwords.

Recognizing risks introduced by statically linked third-party libraries

Extend Your Integrations and Enrich Your Workflows Using Python

The rise of software supply chain attacks, with SolarWinds SunBurst being the most notable, has elevated this issue with every board of directors for every company that’s producing or accepting software.

They say there’s no such thing as bad press, but getting name recognition for a data breach never feels good. Enter Codecov.

Relying on legacy functionalities comes with inherent security risks

One of the core tenets of computer science is code reuse.

Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial