
The Hugging Face API token breach: 5 lessons learned
More than 1,500 tokens were exposed, leaving millions of AI models and datasets vulnerable. Here's what your security team can learn from the compromise.

More than 1,500 tokens were exposed, leaving millions of AI models and datasets vulnerable. Here's what your security team can learn from the compromise.

U.K. and U.S. cyber-watchdogs say to start with Secure by Design — but don't stop there. Here are key takeaways from their new guidelines.

SolarWinds, Codecov, and Kaseya showed how adversaries with access to a development environment can wreak havoc. Multifactor authentication is key, but it's not an "end-all solution."

Mature organizations recognize that their AppSec approach has to keep pace with modern development teams. Here's why.

The Threat Modeling Manifesto explains the how. Now teams must map out an actionable threat modeling program. Here are 10 key tips to get started.

While the new White House EO is largely focused on foundational AI, security teams reviewing AI initiatives are still in the hot seat.

Ingrained development patterns and legacy testing tools are holdovers from a reactive era of AppSec. Here's how how to move software security forward.

Rather than wasting cycles on non-exploitable or remediated security holes, teams should focus on exploitability, and look for compromises including malware and tampering. Here's why.

Zero trust can benefit threat modeling, so why not extend it to your AppSec? Understand the key benefits and challenges.

SLSA and Sigstore are a good first step toward protecting ML models from attack. But they're not a panacea.

SBOMs are essential — but making them useful in CI/CD environments is tricky. Here are 5 key best practices.

The OpenSSF's Secure Supply Chain Consumption Framework can be used to better discover the risks of open-source components — but remediation is left for organizations to figure out later.

Application security veterans Mark Curphey and John Viega went on a CISO listening tour. Here's what they learned.

Extending validity checks is welcome, but secrets risk is bigger than that — and requires a holistic supply chain security approach.

Here's why application programming interface security is critical to risk management — and the advances needed to move API security forward.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial