Cyber Security
No agency has yet to require them in any major way. We first heard about the term SBOM, or software bill of materials, back in...
Hi, what are you looking for?
No agency has yet to require them in any major way. We first heard about the term SBOM, or software bill of materials, back in...
The guide provides recommendations throughout the product lifecycle, from procurement to deployment. Several agencies published the last part in a series about securing the software supply...
The global media industry is facing an onslaught of cybersecurity threats, as new research reveals that those serving the industry are disproportionately susceptible to...
A new program is aiming to reward developers and security researchers who make improvements to critical infrastructure based on open source technology. The Secure...
From the infamous NotPetya campaign to the CCleaner backdoor, watershed infosec moments are not infrequent, but the SolarWinds supply chain attack stands out as particularly consequential. The so-called ‘Sunburst’...
Security researchers have identified multiple workflows in popular continuous integration and development (CI/CD) service GitHub Actions that are vulnerable to command execution. A research...
Supply chain attacks on the rise, costing businesses more year on year as organizations failing to implement zero trust strategies. This is according to...
INTERVIEW The security of the software supply chain has rocketed up the infosec agenda since The Daily Swig last spoke to Brian Fox, co-founder and CTO at...
The Python Package Index (PyPI) is rolling out two-factor authentication (2FA) for “critical projects” in the form of physical security keys. Mindful of the growing threat...
On Friday, the Python Package Index (PyPI), the official repository of third-party open-source Python projects announced plans to mandate two-factor authentication requirement for maintainers of...
Recent Comments