Events & WebinarsLife of an Attack - From Open Source Package to SOC AlertFebruary 17, 2026Register Now
SBOM Power Hour: Inside the Next Generation of SBOMsRead More about SBOM Power Hour: Inside the Next Generation of SBOMsSBOM Power Hour: Inside the Next Generation of SBOMs
The VIBE Is Off: Trend, Meme or Red Flag? Read More about The VIBE Is Off: Trend, Meme or Red Flag? The VIBE Is Off: Trend, Meme or Red Flag?
Optimizing Suspicious File TriageRead More about Optimizing Suspicious File TriageOptimizing Suspicious File Triage
Hacker Summer Camp 2025 DebriefRead More about Hacker Summer Camp 2025 DebriefHacker Summer Camp 2025 Debrief
From Static Trust to Dynamic, Verified TrustRead More about From Static Trust to Dynamic, Verified TrustFrom Static Trust to Dynamic, Verified Trust
ICAP + Deep Cloud Malware Detection Revolution With Spectra Detect v5.5Read More about ICAP + Deep Cloud Malware Detection Revolution With Spectra Detect v5.5ICAP + Deep Cloud Malware Detection Revolution With Spectra Detect v5.5
2025 DBIR & Third Party Breach Risk: A Conversation with VerizonRead More about 2025 DBIR & Third Party Breach Risk: A Conversation with Verizon2025 DBIR & Third Party Breach Risk: A Conversation with Verizon
How to Get Your Software Vendors to Fix Their CodeRead More about How to Get Your Software Vendors to Fix Their CodeHow to Get Your Software Vendors to Fix Their Code
Unmasking a VS Code Supply Chain AttackRead More about Unmasking a VS Code Supply Chain AttackUnmasking a VS Code Supply Chain Attack
Secure by Design: Threat Modeling for DevelopersRead More about Secure by Design: Threat Modeling for DevelopersSecure by Design: Threat Modeling for Developers
Threat Research Round-Up Q2 2025Read More about Threat Research Round-Up Q2 2025Threat Research Round-Up Q2 2025
Manifest Misconceptions: Closing the Gaps in SCA-Based SBOMsRead More about Manifest Misconceptions: Closing the Gaps in SCA-Based SBOMsManifest Misconceptions: Closing the Gaps in SCA-Based SBOMs
Operationalize Network Enrichment with RL APIsRead More about Operationalize Network Enrichment with RL APIsOperationalize Network Enrichment with RL APIs