Read the latest in Product Security thought leadership

fs-background-texture-02-1 (blog)
How Hard Is It to Launch an Offensive Cyber Operation? With TJ White
TJ-White-Finite-State

How Hard Is It to Launch an Offensive Cyber Operation? With TJ White

Jun 14, 2022 9:00:00 AM 16 min read
3 Key Things to Know about Binary Software Composition Analysis (SCA)
binary-software-composition-analysis

3 Key Things to Know about Binary Software Composition Analysis (SCA)

Jun 8, 2022 10:30:56 AM 4 min read
Preventing Git Rebase Fights
preventing git rebase fights

Preventing Git Rebase Fights

Jun 6, 2022 5:47:00 PM 6 min read
Git V: An Optimal Git Branching Model
Git V: An Optimal Git Branching Model

Git V: An Optimal Git Branching Model

Jun 3, 2022 2:52:00 PM 11 min read
The SBOM Is Coming, with Allan Friedman
Allan-Friedman-SBOM-Podcast

The SBOM Is Coming, with Allan Friedman

Jun 2, 2022 12:12:35 PM 15 min read
Product Security Teams: How the Heck Do You Run Them? with Josh Corman
Joshua-Corman-Product-Security

Product Security Teams: How the Heck Do You Run Them? with Josh Corman

May 19, 2022 2:35:53 PM 18 min read
Top 6 Ways Product Security Affects Your Bottom Line
product-security-bottom-line

Top 6 Ways Product Security Affects Your Bottom Line

Mar 30, 2022 10:36:25 AM 4 min read
When Dependabot Is Worse Than Nothing: Log4J As A Sub-Dependency
Log4J As A Sub-Dependency: When Dependabot Is Worse Than Nothing

When Dependabot Is Worse Than Nothing: Log4J As A Sub-Dependency

Mar 16, 2022 4:30:00 PM 5 min read
What Is Product Security?
product-security

What Is Product Security?

Mar 9, 2022 2:10:31 PM 3 min read
Managing Open Source Risk with Device Composition Analysis for Connected Devices

Managing Open Source Risk with Device Composition Analysis for Connected Devices

Mar 8, 2022 10:45:00 AM 2 min read
A Look Back at the Top 12 IoT Exploits of 2021 (Part 2)
Top 12 IoT Exploits of 2021

A Look Back at the Top 12 IoT Exploits of 2021 (Part 2)

Jan 25, 2022 12:23:30 PM 8 min read
A Look Back at the Top 12 IoT Exploits of 2021 (Part 1)
Revisiting the Top 12 IoT Exploits of 2021 (Part 1)

A Look Back at the Top 12 IoT Exploits of 2021 (Part 1)

Jan 14, 2022 11:11:25 AM 8 min read
OWASP Top 10 2021 Explained
OWASP top 10 2021

OWASP Top 10 2021 Explained

Jan 3, 2022 10:00:00 AM 5 min read
Log4j in Your Embedded Products? Find It Before Attackers Do

Log4j in Your Embedded Products? Find It Before Attackers Do

Dec 16, 2021 12:32:39 PM 2 min read
The Present and Future of Finite State
Finite-State-scaled-1

The Present and Future of Finite State

Aug 3, 2021 5:01:55 AM 2 min read