
The state of secrets security: 7 action items for better managing risk
The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

Here's why the duo results in a perfect storm, key considerations — and expert advice on how engineering and application security teams can tackle the problem.

Software complexity is growing — making SBOMs a necessity. But they need to be actionable to manage risk. Here's how to put them to work.

Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.

Understand the state of software supply chain security with key takeaways from recent research and surveys of application security and development pros.

Code bloat is at the root of many security problems. Here's how development teams can bolster application security with more efficient code.

Here’s what we know about the federal government's new software security form — and what needs to change. For one, SBOMs should be required.

The FDA now requires medical device manufacturers to produce a software bill of materials to ensure supply chain security. Here’s what you need to know.

There are many reasons to consider a career in AppSec, but one stands out: Software supply attacks are creating job security and opportunity.

NIST's Cybersecurity Framework 2.0 has been released, complete with a new focus on software supply chain security. Here are the key takeaways for your team.

The National Institute of Standards and Technology has beefed up its guidelines for securing CI/CD environments. Are you ready to bulk up your program?

Know the key challenges with software bills of materials, how tooling affects their usefulness — and how to make them actionable for better supply chain security.

Here's what development and application security teams need to know about using attack trees in combination with threat modeling to lock down their software.

"The Growing Complexity of Securing the Software Supply Chain" report highlights key challenges for application security teams. Here's what you need to know.

2023 was a big year for software security. Here are the key lessons from last year's major attacks to learn from.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial