
What’s in your commercial software?
RL’s Saša Zdjelar joined 'The Cyber Ranch Podcast' to discuss why organizations need to better scrutinize the software they use. Here are the key takeaways.
Read More about What’s in your commercial software?RL’s Saša Zdjelar joined 'The Cyber Ranch Podcast' to discuss why organizations need to better scrutinize the software they use. Here are the key takeaways.
Read More about What’s in your commercial software?IT GRC Forum expert panel: Get back to basics and put your SBOMs to work for better software security. Here are key takeaways.
Read More about Supply chain risk makes software stack visibility essentialThe Exploit Prediction Scoring System performs better than CISA's KEV and CVSS scores for vulnerabilities in the wild — but combining all three works best.
Read More about EPSS and vulnerability management: New scoring system shows promiseThe Post Quantum Cryptography program aims to bolster key components such as public-key algorithms. Here's a full rundown.
Read More about With quantum coming, NIST readies new software supply chain protectionHere's what you need to know about why the Log4j flaw, Log4Shell, remains a threat — and how to protect your organization with a modern software security approach.
Read More about Think Log4j is a wrap? Think again.Leaders from the private sector and government called for a rethink of outdated security tools and practices in an age of API-driven services and AI.
Read More about Hacker Summer Camp: Reboot needed to tackle software supply chain threatsCISA has released an add-on to its supply chain security initiative Secure by Design, with a focus on commercial software. Here’s what you need to know.
Read More about Secure by Demand: Key takeaways for enterprise software buyersSoftware complexity causes many challenges. Here are the key problem areas — and how to overcome the hurdles with a modern supply chain security approach.
Read More about Software complexity is a real problem — and your AppSec must factor that inTraditional security tools are no match for the modern threat landscape. Here are four areas where you can take action.
Read More about Cyber Risk Landscape Peer Report: 4 action items for your organizationSoftware supply chain attacks have been increasing — and more difficult to catch. These talks at Black Hat 2024 will help your team stay ahead of threats.
Read More about 8 supply chain security talks you don't want to miss at Black HatWith RL's new guide, 'Software Supply Chain Security for Dummies,' you have what you need to take a fresh approach to dealing with modern software threats.
Read More about Are you prepared for modern supply chain threats? Update your strategyThe state of supply chain security is broken, and that leaves Black Hat attendees with a sense of urgency — and lots to discuss. Here are two main themes.
Read More about The big cybersecurity themes at Black Hat 2024 — and why they matterA flaw in Puppet Forge on GitHub could have led to a supply chain disaster matching the scope of the attack on SolarWinds. Here are the key takeaways.
Read More about RoguePuppet software supply chain exposure: Lessons learnedReversingLabs' new guide is a great starting point for software builders and buyers who are serious about supply chain security.
Read More about 'Software Supply Chain Security for Dummies': 3 takeaways for your teamAppSec risk managers and development teams: Take note of the key takeaways — and expert analysis.
Read More about OSC&R's supply chain risk report: 95% of organizations face severe threatGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial