How To Address Digital Supply Chain Vulnerabilities

Most organizations do everything they can to manage third-party risks associated with their vendors, agents, resellers and...

Coming to Security Mandate Near You: SBOMs

The recent executive order will expand what companies must disclose to the government when a data breach occurs. Like the...

TCP/IP stacks vulnerabilities are a wake-up call for embedded software

URGENT/11 and other recent vulnerabilities such as AMNESIA:33 related to embedded TCP/IP stacks indicate a deficiency in...

The Future of the SBOM

Although it might seem premature to discuss the future of the software bill of materials (SBOM) before they have even gained...