CISA's Secure Software Development Attestation Form: How SBOMs and Connected Device Security Can Help
SBOMs, Connected Device Security & CISA's Secure Software Attestation

CISA's Secure Software Development Attestation Form: How SBOMs and Connected Device Security Can Help

Jun 18, 2024 4:06:32 PM 4 min read
Strengthening IoT Security Through Secure by Design Principles
How Secure by Design Principles Strengthen IoT Security

Strengthening IoT Security Through Secure by Design Principles

Jun 14, 2024 12:06:25 PM 4 min read
Three Steps Toward Better Software Supply Chain Security
Three Steps Toward Better Software Supply Chain Security

Three Steps Toward Better Software Supply Chain Security

Apr 26, 2024 9:15:00 AM 5 min read
How to Choose the Right Java Library
how to choose a java library

How to Choose the Right Java Library

Mar 22, 2024 10:00:00 AM 4 min read
10 Java Libraries Every Developer Should Know About
top 10 java libraries

10 Java Libraries Every Developer Should Know About

Mar 1, 2024 3:30:00 PM 3 min read
Why Binary Analysis Matters in Software Supply Chain Security and SBOM Generation
Why Binary Analysis Matters in Software Supply Chain Security and SBOM Generation

Why Binary Analysis Matters in Software Supply Chain Security and SBOM Generation

Feb 21, 2024 3:03:00 PM 3 min read
Software Supply Chain Security 101
Software Supply Chain Security 101

Software Supply Chain Security 101

Feb 13, 2024 2:15:00 PM 5 min read
Software Transparency: Continuous Visibility & Connected Device Security
Software Transparency: Continuous Visibility & Connected Device Security

Software Transparency: Continuous Visibility & Connected Device Security

Nov 3, 2023 11:05:00 AM 3 min read
Open Source Software in Software Supply Chains
Open Source Software in Software Supply Chains

Open Source Software in Software Supply Chains

Oct 31, 2023 1:30:00 PM 3 min read
What is software supply chain security? - A Definition
What is software supply chain security? - A Definition

What is software supply chain security? - A Definition

Oct 27, 2023 11:45:00 AM 9 min read
Next Gen Platform: Introducing Our New Dashboards
Next Gen Platform: Introducing New Finite State Dashboards

Next Gen Platform: Introducing Our New Dashboards

Oct 26, 2023 10:49:54 AM 2 min read
Software Supply Chain Security: Measuring Program Success Rates
Software Supply Chain Security: Measuring Program Success Rates

Software Supply Chain Security: Measuring Program Success Rates

Oct 19, 2023 10:05:00 AM 3 min read
A Software Supply Chain Attack Management Guide for Connected Assets
A Software Supply Chain Attack Management Guide for Connected Assets

A Software Supply Chain Attack Management Guide for Connected Assets

Sep 5, 2023 2:10:00 PM 5 min read
Navigating Open Source Compliance Rules & Component License Risks
Navigating Software Component License Risks & Open Source Compliance

Navigating Open Source Compliance Rules & Component License Risks

Sep 5, 2023 11:53:43 AM 3 min read
The Interplay of AI and Cybersecurity: Insights from Alexander Fleischer on the IoT: The Internet of Threats Podcast
AI & Cybersecurity: Alexander Fleischer's Views on IoT Threats Podcast

The Interplay of AI and Cybersecurity: Insights from Alexander Fleischer on the IoT: The Internet of Threats Podcast

Aug 10, 2023 12:27:00 PM 2 min read