AppSec & Supply Chain Security

The evolution of AppSec: Getting off the hamster wheel remains elusive
Experts say scan-and-fix will remain for some time. But application security tools are evolving to provide prioritization and automation.

CISO's open letter on third-party software risk is a call to action
JPMorganChase's Pat Opet has raised a red flag. Learn why — and how SaaSBOMs can help your organization get a handle on risk.

Gartner Market Guide for Supply Chain Security: Why You Need a Comprehensive Solution
Software supply chain security issues are on the rise — and a fragmented tools market may leave companies open to compromise.

Detection as code: How to enhance your real-time threat detection
DaC can bolster the speed, accuracy, and scalability of your threat detection. Here are five essential steps to getting started.

Boost VM security: 8 key strategies
Virtual-machine ubiquity requires rethinking traditional AppSec controls — and modernizing your approach. Here are essential considerations.

5 reasons you need an SaaSBOM
Here's why your organization should consider using SaaSBOMs, key challenges — and how to put CycloneDX's xBOM standard into action.

MCP is a powerful new AI coding technology: Understand the risks
Model Context Protocol makes agentic AI development easier by connecting data sources — but the risks are very real. Here's what you need to know.

Indirect prompt injection attacks target common LLM data sources
Malicious instructions buried in LLM sources such as documents can poison ML models. Here's how it works — and how to protect your AI systems.

SaaS risk is on the rise: 7 action items for better management
The rapid rise of SaaS apps has spawned new risks. One new hopeful stands out: The SaaSBOM. Here are key steps that help rein them in.

MIT researchers tame AI code with new controls
The sequential Monte Carlo method guides LLMs to produce code that plays by basic programming rules. Here's what you need to know.

Mobile and third-party risk: How legacy testing leaves you exposed
Without modern application security tooling, including binary analysis, the third-party risk management puzzle is incomplete.

Secrets leaks increase — and expand beyond the codebase
Leaks from GitHub and other repos are up, but collaboration tools such as Slack and Jira are now a major threat — and a serious blind spot.

Rise of the xBOM: The new go-to tool for software security
CycloneDX 1.6's ML-BOM, SaaSBOM, and CBOM are non-negotiable visibility requirements in the software supply chain security era.

Verizon 2025 DBIR: Third-party software risk takes the spotlight
The latest Data Breach Investigations Report puts the focus squarely on third-party risk. Here’s what you need to know.
