Typosquatting and software supply chain securityLearn More about Typosquatting and software supply chain securityTyposquatting and software supply chain security
SCA Is Good. SSCS Is Better.Learn More about SCA Is Good. SSCS Is Better.SCA Is Good. SSCS Is Better.
Reproducible Builds: Graduate Your Application SecurityLearn More about Reproducible Builds: Graduate Your Application SecurityReproducible Builds: Graduate Your Application Security
What You Need to Know About TamperingLearn More about What You Need to Know About TamperingWhat You Need to Know About Tampering
Development Secrets....Shhhh It's a SecretLearn More about Development Secrets....Shhhh It's a SecretDevelopment Secrets....Shhhh It's a Secret
The State of SSCS 2024: It's a Big DealLearn More about The State of SSCS 2024: It's a Big DealThe State of SSCS 2024: It's a Big Deal
ESF calls for software package final exams: Why binary analysis mattersLearn More about ESF calls for software package final exams: Why binary analysis mattersESF calls for software package final exams: Why binary analysis matters
Why holistic software supply chain security requires binary analysisLearn More about Why holistic software supply chain security requires binary analysisWhy holistic software supply chain security requires binary analysis
Threat modeling meets the SBOM: Why continuous is keyLearn More about Threat modeling meets the SBOM: Why continuous is keyThreat modeling meets the SBOM: Why continuous is key
EO on AI: What security teams need to knowLearn More about EO on AI: What security teams need to knowEO on AI: What security teams need to know
Software Supply Chain Attacks: How vs. WhatLearn More about Software Supply Chain Attacks: How vs. WhatSoftware Supply Chain Attacks: How vs. What
EPSS 3.0 + CVSS: Why Prioritizing Software Risk is KeyLearn More about EPSS 3.0 + CVSS: Why Prioritizing Software Risk is KeyEPSS 3.0 + CVSS: Why Prioritizing Software Risk is Key
Happy Birthday, ReversingGlass!Learn More about Happy Birthday, ReversingGlass!Happy Birthday, ReversingGlass!
How Software Supply Chains Go WrongLearn More about How Software Supply Chains Go WrongHow Software Supply Chains Go Wrong
CISA Secure by Design/Secure by Default is HARDLearn More about CISA Secure by Design/Secure by Default is HARDCISA Secure by Design/Secure by Default is HARD