
5 commercial software attacks — and what you can learn from them
Don't just roll the dice with commercial software risk. Here are key lessons from recent attacks for your security team.

Don't just roll the dice with commercial software risk. Here are key lessons from recent attacks for your security team.

With the threat landscape shifting, boosting your market value requires choosing the right certs. Here's what you need to know.

When developing software there are three options: good, fast, and cheap. But you can only pick two. Here's what that reality means for commercial software risk.

By leveraging modern supply chain security, you can develop better chaos engineering with deeper visibility into all software. Here are key considerations.

The Cybersecurity and Infrastructure Security Agency held its semiannual workshop on software bills of materials recently. Here's what you need to know.

SBOMs are a good start — but modern software supply chain security tooling is needed to make them effective, experts say.

Beau Woods discusses the history of the SBOM, from its humble beginnings to its use today — and efforts to modernize it. Here are key highlights from the interview.

RL’s Saša Zdjelar joined 'The Cyber Ranch Podcast' to discuss why organizations need to better scrutinize the software they use. Here are the key takeaways.

IT GRC Forum expert panel: Get back to basics and put your SBOMs to work for better software security. Here are key takeaways.

The Exploit Prediction Scoring System performs better than CISA's KEV and CVSS scores for vulnerabilities in the wild — but combining all three works best.

The Post Quantum Cryptography program aims to bolster key components such as public-key algorithms. Here's a full rundown.

Here's what you need to know about why the Log4j flaw, Log4Shell, remains a threat — and how to protect your organization with a modern software security approach.

Leaders from the private sector and government called for a rethink of outdated security tools and practices in an age of API-driven services and AI.
.webp&w=3840&q=75)
CISA has released an add-on to its supply chain security initiative Secure by Design, with a focus on commercial software. Here’s what you need to know.

Software complexity causes many challenges. Here are the key problem areas — and how to overcome the hurdles with a modern supply chain security approach.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial