
CISA’s SBOM standards: Beyond checkbox security
The new guidance would raise the bar for software vendors, who will need to ensure the SBOMs they generate are more detailed and machine-readable.

The new guidance would raise the bar for software vendors, who will need to ensure the SBOMs they generate are more detailed and machine-readable.

CSA’s AI Controls Matrix can help development and AppSec teams distill priorities for securing the AI software supply chain.

The new procurement tool seeks to strengthen third-party software risk management (TPSRM). But the process is manual and cumbersome.

The new procurement tool seeks to strengthen third-party software risk management (TPSRM). But the process is manual and cumbersome.

A phishing campaign against maintainers resulted in malware distribution via Javascript in top open-source packages.

With attacks on popular repositories on the rise, PyPI has moved to head off a common technique for duping developers. Here’s what it accomplishes — and where there’s room for improvement.

ESET researchers have discovered malware that taps into OpenAI’s large language model to assist in ransomware attacks.

Here are six lessons learned from the near-miss that was the Amazon Q Developer incident. Don't let luck be your security strategy.

Integrated security in AI assistants could help to catch code flaws — but they are only one layer in a comprehensive AppSec strategy.

Scott Culp’s formulation still holds true — though some additions are needed that account for software supply chain security.

Here's how to integrate AI-specific risks into your existing security incident response (IR) playbook.

Application security pros need to be ready to cope with security at the speed of code. Here's how to get a handle on modern software risk.

The new AI Vulnerability Scoring System (AIVSS) picks up where the Common Vulnerability Scoring System (CVSS) falls short.

Policy as Code is emerging as a key area of focus for AppSec teams in the age of cloud-native development. But implementation can be daunting.

The software supply chain incident highlights how quickly threat actors can turn newly revealed vulnerabilities into widespread attacks.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial