
Passkeys standard: Time to add it to your dev plans?
Forward-thinking DevOps shops are doing it already. Isn’t it time your team got on board?

Forward-thinking DevOps shops are doing it already. Isn’t it time your team got on board?

Robert Martin of MITRE and Cassie Crossley of Schneider Electric discuss how MITRE’s System of Trust helps operationalize software supply chain security.

From Indicators to Action: Streamlining Incident Response with Integrated Threat Intelligence in Sentinel

OWASP is expanding its Top 10 series with a list of large language model vulnerabilities. Here's what AppSec teams need to know.

The ReversingLabs YARA detection rule for HermeticRansom can help you find this ransomware in your environment.

CISA hosted SBOM-a-rama on Wednesday to move software bills of material — a list of ingredients for software and services — forward. Here are top takeaways and insights.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

ConversingLabs caught up with Srinivasan to discuss how OpenSSF's Security Scorecard can aid developers in assessing open source software components for their projects.

Bad actors are finding secrets across the supply chain. Here are the key attack methods — and what's needed to prevent them.

Cl0p quietly tested the flaw for two years before launching the full exploit. Lesson: Look both ways before crossing.

Software vendors that do business with the government must prove they are practicing basic supply chain security. Here's a rundown on the requirements.

Firmware attacks can pose a substantial risk to the software supply chain. Here's what your software security team can learn from the latest compromise.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

ReversingLabs Field CISO Matt Rose explains the difference between application security hacks and software supply chain hacks.

Compiled-code behavior analysis beats old-skool app sec tools.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial