
NSA's zero-trust maturity for AppSec: What you need to know
The new initiative aims to help teams secure application access — and ensure continuous visibility of the workload. Experts weigh in with key insights.

The new initiative aims to help teams secure application access — and ensure continuous visibility of the workload. Experts weigh in with key insights.

Is application security keeping up with modern supply chain attacks? One SME urges "glass half full"-optimism. The reality: AppSec tooling needs an upgrade.

Factors are converging to make sharing of software bills of materials a reality. Here are key concerns — and why data sharing is essential to their effectiveness.

CISA has support from more than 60 companies, and it hopes more will follow. Here's what's in the pledge — and what experts say about its chances of success.

With inherent threats, which are core to the system being modeled, protective measures cannot be perfect or complete. Here's how to best manage that.

The new program, which follows NIST's slowdown on the National Vulnerability Database, will enrich CVEs with contextual data for better vulnerability management.

Here are the highlights that practitioners and leaders should know if they skipped last week's RSAC, the mother of all cybersecurity shows.

The new Data Breach Investigations Report sounds the alarm over software supply chain security — and calls for higher standards for development organizations.

Software supply chain security (SSCS) remains one of the most popular talk tracks at RSA Conference. Here are the sessions that look most interesting.

RL announced the Spectra Advanced File Analysis and Malware Detection suite, a strategic update of our malware analysis and threat hunting solutions for advanced file analysis and threat detection. Here’s what you need to know.

Cybersecurity Framework 2.0 includes measures for C-SCRM, a NIST program for improving software risk management. Get key insights from our Webinar.

Here's what changes to the National Vulnerability Database mean for vulnerability management — and why you should instead focus on malware and tampering.

The foundation is upgrading the standard for the quantum era, adding ML-readable attestation and more. Here's how it boosts software supply chain security.

Generative AI can ease the burdens of threat modeling — and speed it up. But it's not a panacea. Here's what security teams can realistically expect.

The new checklist is organized into 13 areas of analysis. Here's what your security team needs to know about the most important points from each area.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial