Search results: closed source software

How CISA’s secure software development attestation form falls short

How CISA’s secure software development attestation form falls short

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the White House’s Office of Management and Budget (OMB) have released their Secure Software Development Attestation Form, a long-anticipated worksheet that asks organizations ...
What is a software bill of materials?

What is a software bill of materials?

Understand the importance of a Software Bill of Materials (SBOM) and how it helps manage security, license, and operational risks in open source usage.The post What is a software bill of materials? ...
A definitive guide: Federal software supply chain security initiatives

A definitive guide: Federal software supply chain security initiatives

Software supply chain security is now top-of-mind for software producers and consumers alike, given the dramatic increase in malicious packages (as noted in RL's The State of Software Supply Chain Security 2024 ...
The Cloudflare source code breach: Lessons learned

The Cloudflare source code breach: Lessons learned

The high-profile web hosting company Cloudflare said last week that a sophisticated attacker gained access to code repositories used by the company, and made off with sensitive internal code. This was just ...
The State of Software Supply Chain Security 2024: Key takeaways

The State of Software Supply Chain Security 2024: Key takeaways

Software supply chain attacks are now mainstream events — a change in tactics by cyber-attackers that you can measure in headlines, which in recent years have delivered news about attacks on popular ...
Software Supply Chain Security Solution – Supply Chain Security Control

Software Supply Chain Security Solution – Supply Chain Security Control

| | Blog, supply chain security
Establishing a Software Supply Chain Asset Register An organization’s products and services are diverse and complex. By establishing a software supply chain asset register, you can have a clear understanding of the ...
What is HIPAA Compliance Software?

Top 8 HIPAA Compliance Software

The Hippocratic Oath is a historically significant ethical code traditionally taken by healthcare professionals. Named after Hippocrates, a Greek physician regarded as the father of Western medicine, the oath sets guidelines for ...
Introducing Raven: CI/CD Pipeline Security with Open Source Vulnerability Scanner Starting with GitHub Actions

Introducing Raven: CI/CD Pipeline Security with Open Source Vulnerability Scanner Starting with GitHub Actions

Cycode is proud to announce the public release of Raven... The post Introducing Raven: CI/CD Pipeline Security with Open Source Vulnerability Scanner Starting with GitHub Actions appeared first on Cycode ...

Supermicro IPMI Firmware Vulnerabilities Disclosed

A number of security flaws have recently been discovered in Supermicro’s baseboard management controllers (BMCs). These Supermicro IPMI firmware vulnerabilities in the Intelligent Platform Management Interface (IPMI) pose serious dangers, including privilege ...