
How to secure AI in container workloads
Use of AI in container workloads is growing — but security is not native. That makes additional controls essential. Here’s what you need to know.
Read More about How to secure AI in container workloads
Use of AI in container workloads is growing — but security is not native. That makes additional controls essential. Here’s what you need to know.
Read More about How to secure AI in container workloads
More than half of Model Context Protocol servers were found to rely on static, long-lived credentials. With AI agents on the rise, that’s a problem.
Read More about MCP credential weakness raises red flags
Application security posture management is only as good as the technology it depends on. Here’s why modern software supply chain security tooling is key.
Read More about Why modern AppSec is key to ASPM
Vibe-coded apps that make it to production can be a minefield for security teams. Here are key takeaways for your AppSec team.
Read More about 5 vibe coding security lessons
Built-in security can play a role — and fits with the Secure by Design concept — but robust security controls remain essential.
Read More about Why 'security as by-product’ can't replace controls
Attack surface management (ASM) isn’t just another buzzword. It represents a fundamental shift in security strategy with risk on the rise.
Read More about ASM and the attack surface: 10 key risk factors
A malicious Model Context Protocol package was found in the wild last week. Here are lessons from the compromise of the AI interface tool.
Read More about The Postmark MCP server attack: 5 key takeaways
Here's what you need to know about the discovery of the first self-replicating npm worm, which compromised packages with cloud token-stealing malware.
Read More about FAQ: The Shai-hulud npm worm attack explained
While security defenders welcomed the new vulnerability-validation tool, others stress it can be just as useful for would-be attackers.
Read More about CVE-Genie raises stakes in the vulnerability race
AI coding and other modern development practices mean flawed code will continue to ship. Here are key recommendations for managing software risk.
Read More about Deadlines vs. secure code: How AppSec can cope
The new guidance would raise the bar for software vendors, who will need to ensure the SBOMs they generate are more detailed and machine-readable.
Read More about CISA’s SBOM standards: Beyond checkbox security
CSA’s AI Controls Matrix can help development and AppSec teams distill priorities for securing the AI software supply chain.
Read More about Trustworthy AI is key: 9 key threat categories
The new procurement tool seeks to strengthen third-party software risk management (TPSRM). But the process is manual and cumbersome.
Read More about CISA tool aims to boost security for software onboarding
The new procurement tool seeks to strengthen third-party software risk management (TPSRM). But the process is manual and cumbersome.
Read More about CISA tool aims to boost security for software onboarding
A phishing campaign against maintainers resulted in malware distribution via Javascript in top open-source packages.
Read More about Crypto wallets hit in widespread npm, GitHub hackGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial