AppSec & Supply Chain Security
With Quantum coming, NIST readies new software supply chain protection
While quantum computing is years away from practical deployment, it will pose a major threat to software supply chain security, and now is the time for security teams to prepare for that ...
Hacker Summer Camp: Reboot needed to tackle software supply chain threats
“Everything under heaven is in chaos. The situation is excellent!” That is how Mao Zedong, the chairman of China's Communist party, read the state of affairs in China in the early 1960s ...
Secure by Demand: Key takeaways for enterprise software buyers
This week, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) took a major step forward as it continues to define federal software supply chain security policy. “Secure by Demand Guide: How Software ...
Software complexity is a real problem — and your AppSec must factor that in
Achieving strong application security is hard even when AppSec and development teams are overseeing the simplest applications and the most streamlined application portfolios. But "simple" is relative. Most modern software products are ...
Cyber Risk Landscape Peer Report: 4 action items for your organization
Traditional measures to detect and respond to cyberattacks are inadequate to protect organizations against modern data breaches, a new report has found ...
The big cybersecurity themes at Black Hat 2024 — and why they matter
As tens of thousands of cybersecurity professionals, executives and policymakers converge on the Las Vegas strip for “Hacker Summer Camp”— the annual Black Hat, DEF CON and B-Sides conferences — the stakes ...
8 supply chain security talks you don’t want to miss at Black Hat
Numerous reports have highlighted the increased number of software supply chain attacks in recent years. The Verizon Business Data Breach and Investigation Report (DBIR) 2024 concluded that breaches stemming from third-party software ...
Are you ready for modern supply chain threats? Update your approach
In today's intricately interconnected and complex software development ecosystem, a single compromised component can trigger a cascade of security breaches across thousands of organizations worldwide. And the cautionary tales keep piling up: ...
Are you prepared for modern supply chain threats? Update your approach
In today's intricately interconnected and complex software development ecosystem, a single compromised component can trigger a cascade of security breaches across thousands of organizations worldwide. And the cautionary tales keep piling up: ...