
A Closer Look at the Enduring Security Framework’s Guidance

Déjà Vu: Uncovering Stolen Algorithms in Commercial Products

IconBurst - The Newest Software Supply Chain Attack

Robert Martin of MITRE on Supply Chain System of Trust

Steve Lipner of SAFECODE on Supply Chain Security - Is It Even Possible?

Bryson Bort of Scythe.io talks about the Colonial Pipeline attack and the lessons learned from the crippling ransomware attack a year ago








