
OWASP's Dependency-Track tool update: Key changes — and limitations
Here's what you need to know about the version 4.12.0 update — and about managing risk from your software, whether it's open source or not.

Here's what you need to know about the version 4.12.0 update — and about managing risk from your software, whether it's open source or not.

Chris Romeo shares five key ways to merge modeling with modern software supply chain security — and improve your software risk management in the process.

Chris Romeo shares five key ways to merge modeling with modern software supply chain security — and improve your software risk management in the process.

Don't just roll the dice with commercial software risk. Here are key lessons from recent attacks for your security team.

With the threat landscape shifting, boosting your market value requires choosing the right certs. Here's what you need to know.

When developing software there are three options: good, fast, and cheap. But you can only pick two. Here's what that reality means for commercial software risk.

By leveraging modern supply chain security, you can develop better chaos engineering with deeper visibility into all software. Here are key considerations.

The Cybersecurity and Infrastructure Security Agency held its semiannual workshop on software bills of materials recently. Here's what you need to know.

SBOMs are a good start — but modern software supply chain security tooling is needed to make them effective, experts say.

Beau Woods discusses the history of the SBOM, from its humble beginnings to its use today — and efforts to modernize it. Here are key highlights from the interview.

RL’s Saša Zdjelar joined 'The Cyber Ranch Podcast' to discuss why organizations need to better scrutinize the software they use. Here are the key takeaways.

IT GRC Forum expert panel: Get back to basics and put your SBOMs to work for better software security. Here are key takeaways.

The Exploit Prediction Scoring System performs better than CISA's KEV and CVSS scores for vulnerabilities in the wild — but combining all three works best.

The Post Quantum Cryptography program aims to bolster key components such as public-key algorithms. Here's a full rundown.

Here's what you need to know about why the Log4j flaw, Log4Shell, remains a threat — and how to protect your organization with a modern software security approach.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial