This is the fourth and final post in our series on managing SBOMs at scale, where we’ll dive into the intricacies of creating, managing, and ingesting complex dependent SBOMs. If you haven’t read it yet, check out our first three posts “DevSecOps Roadmap: Do I Really Need SBOMs?”, “DevSecOps Roadmap: Generating SBOMs”, and “DevSecOps Roadmap:…
Continue ReadingDevelopers
Industry News
Fidelity says data breach exposed personal data of 77,000 customers
Internet Archive hacked, data breach impacts 31 million users
Water supplier American Water Works says systems hacked
Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing Links
SEC Charges SolarWinds and CISO with Fraud, Internal Control Failures
DevSecOps Roadmap Part 3: Ingest, Manage, and Monitor SBOMs
This is the third post in our series on managing SBOMs at scale, where we’ll dive into how to ingest, manage and monitor SBOMs that you receive. If you haven’t read them yet, check out our first two posts “DevSecOps Roadmap: Do I Really Need SBOMs?” and “DevSecOps Roadmap: Generating SBOMs”. In previous posts we…
Continue ReadingDevSecOps Roadmap Part 2 – Generating SBOMs
This is the second post in our series on managing SBOMs at scale, where we’ll dive into defining goals around SBOM generation in order to determine which type of SBOM to generate, when and how to generate and where you might store SBOMs. If you haven’t read it yet, check out our first post “DevSecOps…
Continue ReadingDevSecOps Roadmap Part 1 – Do I Really Need SBOMs?
This is the first in our series on SBOMs, where we’ll dive into: Much of this series will focus on high level processes and ideal practices, and less so on the actual implementation details, so if you’re looking for those check out the last post in the series here. If you need a refresher on…
Continue ReadingSoftware Security in AgriTech: Protecting Farms from Cyber Pests
Agriculture has come a long way from dirt, seeds, and hope. Today’s farms are powered by sophisticated agriculture technology, known as AgriTech, like precision farming software, automated irrigation systems, AI-driven crop monitoring, and smart machinery that practically runs itself. But just like real pests threaten crops, digital pests like bad code and unpatched vulnerabilities pose…
Continue ReadingLocking Down LogiTech: How to Secure Supply Chain Software
The logistics industry has come a long way from clipboards and paper trails. Today, supply chains run on software or logistics technology aka LogiTech. Route optimization tools, vehicle telemetry data, warehouse automation, and real-time shipment tracking platforms help logistics companies optimize operations, improve efficiency, and enhance their customer experience. The right tech keeps everything moving…
Continue ReadingSecuring NonprofitTech: Protecting the Digital Tools Powering Good Causes
Nonprofits exist to change the world. Whether you’re tackling hunger, providing essential care, or working on countless other missions, the work you do matters. But your impact is also what makes you a prime target for exploitation. You may not have the deep pockets of big corporations, but you do have something hackers want: data…
Continue ReadingDataTech Software Security: Protecting the Data That Powers Business
Nearly every business today relies on vast amounts of data to run. Data Technology companies, or DataTech for short, are at the center of it all. They’re the logging platforms, data aggregators, integration tools, and visualization dashboards businesses use to clean up and make sense of raw data. Given how valuable it is to businesses,…
Continue ReadingSoftware Security in RetailTech: Keeping Your Systems Safe While Meeting Customer Demands
The retail technology industry, or RetailTech for short, has completely changed how we shop, making everything from point-of-sale (POS) systems to inventory management and e-commerce platforms faster, smarter, and more seamless. Unfortunately, the technology advancements that we love as consumers, and that retailers expect from technology providers, also make things easier for cybercriminals who would…
Continue ReadingSoftware Security in the BioTech Industry: Best Practices to Balance Innovation and Risk
The BioTech industry is all about pushing boundaries: understanding diseases, developing new treatments, and generally making the world a better place. But while BioTech companies are busy pushing what’s possible in healthcare, cybercriminals are just as busy figuring out how to steal research, mess with clinical trials, or expose patient data for their benefit. If…
Continue Reading