
Hacker Summer Camp: Reboot needed to tackle software supply chain threats
Leaders from the private sector and government called for a rethink of outdated security tools and practices in an age of API-driven services and AI.

Leaders from the private sector and government called for a rethink of outdated security tools and practices in an age of API-driven services and AI.
.webp&w=3840&q=75)
CISA has released an add-on to its supply chain security initiative Secure by Design, with a focus on commercial software. Here’s what you need to know.

Software complexity causes many challenges. Here are the key problem areas — and how to overcome the hurdles with a modern supply chain security approach.

Traditional security tools are no match for the modern threat landscape. Here are four areas where you can take action.

Software supply chain attacks have been increasing — and more difficult to catch. These talks at Black Hat 2024 will help your team stay ahead of threats.

With RL's new guide, 'Software Supply Chain Security for Dummies,' you have what you need to take a fresh approach to dealing with modern software threats.

The state of supply chain security is broken, and that leaves Black Hat attendees with a sense of urgency — and lots to discuss. Here are two main themes.

A flaw in Puppet Forge on GitHub could have led to a supply chain disaster matching the scope of the attack on SolarWinds. Here are the key takeaways.

ReversingLabs' new guide is a great starting point for software builders and buyers who are serious about supply chain security.

AppSec risk managers and development teams: Take note of the key takeaways — and expert analysis.

Secure by Design's cousin can help make software more secure out of the box by adding guardrails to development. Here's how it helps — and its limitations.

Rev up your application security and software supply chain security engines by subscribing to these six practitioner-curated Substacks.

Tool sprawl is making alert fatigue a major problem for teams responsible for application security. Here are four ways to combat it in your organization.

The compromise of the widely used Polyfill.io CDN contains important lessons for organizations on trust.

The aim is to build a unifying framework incorporating existing SBOM data models, including CSAF, CycloneDX, OpenVEX, and SPDX. Experts weigh in with key insights.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial