
OWASP researcher: Supply chain attacks require going beyond vulnerabilities
Jeremy Long, who founded OWASP's Dependency Check Program, urges organizations to shift from traditional AppSec testing to tools that can remediate malicious threats.

Jeremy Long, who founded OWASP's Dependency Check Program, urges organizations to shift from traditional AppSec testing to tools that can remediate malicious threats.

Stealthy Connections: The Rising Threat of Cloudflare Tunnel Abuse in Cyber Attacks

To manage risk, you need to trust the software you produce or consume — and that requires verification, provided by modern tools and a holistic approach.

Black Hat USA is a showcase for top security experts and companies. Here's our short list of must-see sessions for 2023.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Here's why the Rust Foundation Security Initiative's audit and resulting new tooling matter for secure coding — and software supply chain security.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Traditional application security can't defend against today's attacks. Our report explains why — and why you need to upgrade your AppSec strategy.

In addition to the extensive list of components in today's software, AI relies on open-source AI models and training data. What could possibly go wrong?

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The big-fish IAMaaS cloud identity service provider opens its kimono. What can you learn from the exposure?

CISA and NSA issued security guidance on continuous integration/continuous delivery (CI/CD) environments — but missed an opportunity to escalate the conversation.

With CycloneDX 1.5, OWASP is introducing a number of new types of SBOMs. Here's a full run-down on changes — and what they mean for software transparency.

The privacy of user data is one thing — but security of that data is equally important.

Here's what you need to know about third-party risk management — and why to prioritize comprehensive supply chain security.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial