Log4j and the Role of SBOMs in Reducing Software Security Risk

Recent high-profile cybersecurity incidents such as the SolarWinds attack and the Apache Log4j vulnerability have exposed the...

Top three tips for ensuring software supply chain security

At a time when “software supply chain attack” has become a household phrase, the recent vulnerability discovered in the Apache ...

How To Address Digital Supply Chain Vulnerabilities

Most organizations do everything they can to manage third-party risks associated with their vendors, agents, resellers and...

Coming to Security Mandate Near You: SBOMs

The recent executive order will expand what companies must disclose to the government when a data breach occurs. Like the...

TCP/IP stacks vulnerabilities are a wake-up call for embedded software

URGENT/11 and other recent vulnerabilities such as AMNESIA:33 related to embedded TCP/IP stacks indicate a deficiency in...