
A Closer Look at the Enduring Security Framework’s Guidance
Learn More about A Closer Look at the Enduring Security Framework’s Guidance
Don’t Sleep on Software Bills of Materials
Learn More about Don’t Sleep on Software Bills of Materials
Déjà Vu: Uncovering Stolen Algorithms in Commercial Products
Learn More about Déjà Vu: Uncovering Stolen Algorithms in Commercial Products
Not All Developers Can Be Security Jedis
Learn More about Not All Developers Can Be Security Jedis
Lessons Learned from CI/CD Compromises
Learn More about Lessons Learned from CI/CD Compromises
Smash and Grab - AstraLocker Breach
Learn More about Smash and Grab - AstraLocker Breach
IconBurst - The Newest Software Supply Chain Attack
Learn More about IconBurst - The Newest Software Supply Chain Attack
Robert Martin of MITRE on Supply Chain System of Trust
Learn More about Robert Martin of MITRE on Supply Chain System of Trust
Steve Lipner of SAFECODE on Supply Chain Security - Is It Even Possible?
Learn More about Steve Lipner of SAFECODE on Supply Chain Security - Is It Even Possible?
Bryson Bort of Scythe.io talks about the Colonial Pipeline attack and the lessons learned from the crippling ransomware attack a year ago
Learn More about Bryson Bort of Scythe.io talks about the Colonial Pipeline attack and the lessons learned from the crippling ransomware attack a year ago
Dependency Confusion As A Tool For Targeted NPM Hacks
Learn More about Dependency Confusion As A Tool For Targeted NPM Hacks