
How supply chain security tools can protect ML models
SLSA and Sigstore are a good first step toward protecting ML models from attack. But they're not a panacea.
Read More about How supply chain security tools can protect ML modelsSLSA and Sigstore are a good first step toward protecting ML models from attack. But they're not a panacea.
Read More about How supply chain security tools can protect ML modelsSBOMs are essential — but making them useful in CI/CD environments is tricky. Here are 5 key best practices.
Read More about 5 best practices for securing your CI/CD with software bills of materialsThe OpenSSF's Secure Supply Chain Consumption Framework can be used to better discover the risks of open-source components — but remediation is left for organizations to figure out later.
Read More about How mature is your open-source risk management? S2C2F helps map dependenciesApplication security veterans Mark Curphey and John Viega went on a CISO listening tour. Here's what they learned.
Read More about App sec prioritization is priority No. 1 for CISOsExtending validity checks is welcome, but secrets risk is bigger than that — and requires a holistic supply chain security approach.
Read More about GitHub boosts secrets scanning: A necessary step, but supply chain security is key to managing riskHere's why application programming interface security is critical to risk management — and the advances needed to move API security forward.
Read More about Are APIs the weak link in your supply chain security?NIST's new guidelines are welcome, but some organizations may find it challenging to put them into practice.
Read More about NIST supply chain security guidance for CI/CD environments: What you need to knowNIST's new guidelines are welcome, but some organizations may find it challenging to put them into practice.
Read More about NIST supply chain security guidance for CI/CD environments: What you need to knowWill the Exploit Prediction Scoring System improve application security now — and software supply chain security in the future? Here's what you need to know.
Read More about EPSS vs. CVSS: Exploit prediction could move the needle on software riskWhat if dev and app sec teams showed the same ingenuity, nimbleness and ruthless efficiency as cybercriminals? Fastly's Kelly Shortridge explains why that's essential to resilience.
Read More about The art of security chaos engineeringIn this episode of ConversingLabs, recorded on the sidelines of Black Hat in Las Vegas, NetRise CEO Thomas Pace talks about supply chain threats to the Internet of Things (IoT).
Read More about IoT and the supply chain: The road to securing devicesThese leading app sec experts provide a steady flow of security knowledge to keep you up to speed.
Read More about 20 application security pros you should followIn this ConversingLabs, Daniel Woods shares insights from his research on software warranties and discusses how shifting liability to producers could define the market.
Read More about Lemons and liability: How security warranties could tame the software marketKnowledge sharing with cybersecurity experts doesn't have to stop after Hacker Summer Camp wraps up. Follow these top speakers throughout the year.
Read More about 10 Hacker Summer Camp speakers to follow year-roundWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: WinRAR exploit targets traders, malicious npm packages go after game devsGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial