
8 key software security fails to avoid
Security best practices can help, but it’s the bad practices that will expose your company to software risk. Here are the ones to avoid at all cost.
Read More about 8 key software security fails to avoidSecurity best practices can help, but it’s the bad practices that will expose your company to software risk. Here are the ones to avoid at all cost.
Read More about 8 key software security fails to avoidA Cloud Security Alliance report explores new requirements for the tools, processes, and roles that secure AI-driven systems. Here are key takeaways.
Read More about Secure AI deployment is complicated: 5 ways to get your ducks in a rowSoftware security is front of mind for organizations. What developers have to say is critical. Here are four key takeaways from a survey of engineers about AppSec.
Read More about What developers think about application security might surprise youSeveral factors are driving the need for better detection of malicious files. Ransomware is one that stands out. Here's how to boost your triage efforts.
Read More about Suspicious file analysis: Enhance your SOC to fight sophisticated attacksThe agency's new IT Sector-Specific Goals (SSGs) for application security aim to keep Secure by Design going strong. Here are the top action items.
Read More about CISA cybersecurity performance goals: 7 action items to boost your AppSecLearn how Glasswall leverages file reputation data to strengthen zero-trust file protection in its Content Disarm and Reconstruction approach.
Read More about Glasswall and RL: Enhancing CDR with Advanced Threat IntelligenceSoftware development teams working on machine learning take note: RL threat researchers have identified nullifAI, a novel attack technique used on Hugging Face.
Read More about Malicious ML models discovered on Hugging Face platformLearn how RL's Advanced Malware Analysis can help your organization move beyond the sandbox to better guard against malicious files.
Read More about Sandboxes Alone Won’t Stop the Malware Onslaught. Here’s What Will.Here are key practices you must implement to protect container workloads — and new controls needed for all software — in the age of supply chain security.
Read More about Get real about container security: 4 essential practices to manage riskWhen it comes to these two security approaches advanced by CISA for locking down your application security, it's not an either/or proposition. Here's why.
Read More about Secure by Design and Secure by Default: You need both to boost AppSecIdentity management is key for security, but AI is bringing a lot more non-humans into the mix. The OWASP list calls attention to this. Here are the top takeaways.
Read More about OWASP tackles AI security with new NHI Top 10: What you need to knowAI can improve cybersecurity outcomes, but it also represents an entirely new threat. Upgrade your security strategy — and tooling — for the AI age.
Read More about AppSec & Supply Chain Security | January 28, 2025 AI is a double-edged sword: Why you need new controls to manage riskThe report emphasizes traditional AppSec practices — but those are no match for new threats from AI/ML. Here's what you need to know.
Read More about BSIMM15 shines light on compliance and AI securityHere are the key reasons you should consider multi-scanning — and how ReversingLabs’s solution delivers best-of-class performance.
Read More about Multi-Scanning Antivirus: Boost Your Threat Hunting With Multiple LayersAI's integration across enterprise platforms is "rapidly expanding the global attack surface." Here are five action items for your team.
Read More about Securing generative AI: 5 action items to protect your organizationGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial