Source Link Software supply chain attacks are on the rise, as cited in the…
Chris Hughes
-
-
Network SecuritySecurity
Key takeaways from the Open Cybersecurity Schema Format
by Chris Hughesby Chris HughesSource Link One of the most pervasive challenges in the current cybersecurity environment is…
-
Source Link Cybersecurity team conversations these days can feel like a rainbow, with mentions…
-
Application SecuritySecurity
Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable
by Chris Hughesby Chris HughesSource Link The fallout of the SolarWinds cybersecurity incident, coupled with Cybersecurity Executive Order…
-
Application SecuritySecurity
SBOM formats SPDX and CycloneDX compared
by Chris Hughesby Chris HughesSource Link Software bills of materials (SBOMs) are becoming a critical component of vulnerability…
-
Application SecuritySecurity
How OpenSSF Scorecards can help to evaluate open-source software risks
by Chris Hughesby Chris HughesSource Link Everyone knows the phrase “software is eating the world” by Marc Andreessen…
-
Application SecuritySecurity
Breaking down CIS’s new software supply chain security guidance
by Chris Hughesby Chris HughesSource Link Securing the software supply chain continues to be one of the most…
-
Application SecuritySecurity
Understanding your API attack surface: How to get started
by Chris Hughesby Chris HughesSource Link We live in a world of cloud computing, mobile devices and microservices.…
-
Cloud SecuritySecurity
Key takeaways from CSA’s SaaS Governance Best Practices guide
by Chris Hughesby Chris HughesSource Link SaaS governance and security is gaining attention among IT and security leaders.…
-
Application SecuritySecurity
How the Secure Software Factory Reference Architecture protects the software supply chain
by Chris Hughesby Chris HughesSource Link The term “factory” related to software production might seem bizarre. Most still…