-
February 21, 2023
Making Sense of SBOMs: The Minimum Requirements
The National Telecommunications and Information Administration (NTIA), under the guidance of the US Department of Commerce, recently released a white...
-
February 15, 2023
Making Sense of the software bill of materials (SBOM): The Basics
Even though Software Bills of Materials (SBOMs) have been around for about 10 years, they have recently gained a lot...
-
December 7, 2022
Pipeline Composition Analysis: Expanding Visibility to Build Better Software Supply Chain Security
Software supply chain attacks have been on the rise over the past several years. We see evidence of this daily...
-
October 31, 2022
The Scariest Things About SCA
It is a time of ghouls, mischievous spirits, and David S. Pumpkins. In the spirit of Halloween, here are the...
-
June 28, 2022
A Strong Foundation of Governance Improves All SDLC Security Initiatives
The innovation of DevOps toolchains has delivered increased efficiency for engineering teams. At the same time, these innovations have also...
-
April 28, 2022
The Real Cost of a Source Code Leak
If source code falls into the hands of malicious actors, the repercussions can be devastating.
-
April 19, 2022
Lateral Movement and the Threat to Software Supply Chains
Lateral movement in the SDLC occurs when an attacker gains access to a user account then uses those credentials to...
-
March 18, 2022
Your Software Supply Chain Is Your Weakest Security Link
The bad news is that attackers are shifting their focus to your less secure and easier-to-breach software supply chain.
-
February 28, 2022
Software Supply Chain Security: Your Attack Surface Is Bigger Than You Think
When most organizations approach software supply chain security, too often they think only about securing the open source or third-party...