

The Lessons of Layer 8: Dr. Jessica Barker on The Human Elements Driving Cyber Attacks

Outpacing VirusTotal: Redefining Trusted Threat Analysis and Intelligence
See how RL is outpacing VT with our Threat Intelligence and Analysis Tools.

Definitive Timeline: Federal Guidance on Software Supply Chain Security

Unraveling XZ: A Software Supply Chain Under Siege
Get in-depth insights into the latest software supply chain threat.

Webinar: Spectra Assure for Software Supply Chain Security

SBOMS are Having A Moment: How To Make Them Actionable
RL's Saša Zdjelar and Joe Coletta are joined by ExtraHop’s Christopher Chan to discuss new supply chain guidelines/regulations — and why the SBOM matters.

Threat Research Round-Up Q1 2024: Malicious Dependencies Fly Under the Radar

E-Discovery Under Threat: Strengthening Malware Defenses in Legal Firms

Know When Your Software is Malware: The New Era of Software Security

Trust Secured: Conquer Software-Based Threats in the CI/CD Pipeline
Watch to learn how to upgrade your CI/CD pipeline with binary analysis, threat detection, and secure code signing.



-1-480x250.webp&w=1080&q=75)