

AI in the Software Supply Chain: Balancing Innovation and Security in the Age of AI

Exposing Software Supply Chain Weaknesses
Watch Now about Exposing Software Supply Chain Weaknesses
YARA Rules 101: Learn to Write & Use High-Quality Rules for Threat Hunting & Detection
Watch Now about YARA Rules 101: Learn to Write & Use High-Quality Rules for Threat Hunting & Detection
The MLephant in the Room: Malware Detection in ML & LLM Models
Watch Now about The MLephant in the Room: Malware Detection in ML & LLM Models
Spectra Assure: The Complete Solution for Software Supply Chain Security
Watch Now about Spectra Assure: The Complete Solution for Software Supply Chain Security
Supercharge Threat Modeling with Software Supply Chain Security
Watch Now about Supercharge Threat Modeling with Software Supply Chain Security
The Survival Guide to Managing Third-Party Software Risk
Watch Now about The Survival Guide to Managing Third-Party Software Risk
Threat Research Round-Up Q3 2024
Watch Now about Threat Research Round-Up Q3 2024
The 5 Misconceptions of Software Supply Chain Security
Watch Now about The 5 Misconceptions of Software Supply Chain Security
Do More With Your SOAR: Enhance Your SOC With RL Threat Intelligence Enrichment
Watch Now about Do More With Your SOAR: Enhance Your SOC With RL Threat Intelligence Enrichment
Software Supply Chain Security 101 : Technical Tactics of Supply Chain Compromises
Watch Now about Software Supply Chain Security 101 : Technical Tactics of Supply Chain Compromises
SSCS for Dummies: Practical Tips to Improve Software Security Posture
Watch Now about SSCS for Dummies: Practical Tips to Improve Software Security Posture
Don't Stop at the SBOM: Take Your SSCS to the Next Level
Watch Now about Don't Stop at the SBOM: Take Your SSCS to the Next Level
Webinar: Black Hat 2024 RECAP
Watch Now about Webinar: Black Hat 2024 RECAP