

YARA Rules 101: Learn to Write & Use High-Quality Rules for Threat Hunting & Detection

The MLephant in the Room: Malware Detection in ML & LLM Models
Learn More about The MLephant in the Room: Malware Detection in ML & LLM Models
Spectra Assure: The Complete Solution for Software Supply Chain Security
Learn More about Spectra Assure: The Complete Solution for Software Supply Chain Security
Supercharge Threat Modeling with Software Supply Chain Security
Learn More about Supercharge Threat Modeling with Software Supply Chain Security
The Survival Guide to Managing Third-Party Software Risk
Learn More about The Survival Guide to Managing Third-Party Software Risk
Threat Research Round-Up Q3 2024
Learn More about Threat Research Round-Up Q3 2024
The 5 Misconceptions of Software Supply Chain Security
Learn More about The 5 Misconceptions of Software Supply Chain Security
Do More With Your SOAR: Enhance Your SOC With RL Threat Intelligence Enrichment
Learn More about Do More With Your SOAR: Enhance Your SOC With RL Threat Intelligence Enrichment
Software Supply Chain Security 101 : Technical Tactics of Supply Chain Compromises
Learn More about Software Supply Chain Security 101 : Technical Tactics of Supply Chain Compromises
SSCS for Dummies: Practical Tips to Improve Software Security Posture
Learn More about SSCS for Dummies: Practical Tips to Improve Software Security Posture
Don't Stop at the SBOM: Take Your SSCS to the Next Level
Learn More about Don't Stop at the SBOM: Take Your SSCS to the Next Level
ReversingLabs vs. Virus Total
Learn More about ReversingLabs vs. Virus Total
SCA Tools & SSCS - Better Together
Learn More about SCA Tools & SSCS - Better Together
The 3CX Software Supply Chain Hack and The Impact on Publishers and Consumers
Learn More about The 3CX Software Supply Chain Hack and The Impact on Publishers and Consumers