
AI and the software supply chain: AppSec just got way more complicated
In addition to the extensive list of components in today's software, AI relies on open-source AI models and training data. What could possibly go wrong?

In addition to the extensive list of components in today's software, AI relies on open-source AI models and training data. What could possibly go wrong?

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The big-fish IAMaaS cloud identity service provider opens its kimono. What can you learn from the exposure?

CISA and NSA issued security guidance on continuous integration/continuous delivery (CI/CD) environments — but missed an opportunity to escalate the conversation.

With CycloneDX 1.5, OWASP is introducing a number of new types of SBOMs. Here's a full run-down on changes — and what they mean for software transparency.

The privacy of user data is one thing — but security of that data is equally important.

Here's what you need to know about third-party risk management — and why to prioritize comprehensive supply chain security.

Hackers are having a field day targeting developers with supply chain attacks, which open doors to other compromises. Here's why — and what to do about it.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Forward-thinking DevOps shops are doing it already. Isn’t it time your team got on board?

Robert Martin of MITRE and Cassie Crossley of Schneider Electric discuss how MITRE’s System of Trust helps operationalize software supply chain security.

OWASP is expanding its Top 10 series with a list of large language model vulnerabilities. Here's what AppSec teams need to know.

CISA hosted SBOM-a-rama on Wednesday to move software bills of material — a list of ingredients for software and services — forward. Here are top takeaways and insights.

ConversingLabs caught up with Srinivasan to discuss how OpenSSF's Security Scorecard can aid developers in assessing open source software components for their projects.

Bad actors are finding secrets across the supply chain. Here are the key attack methods — and what's needed to prevent them.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial