Proactive compliance with Sonatype: Automating reporting for U.S. Army SBOM requirements

Proactive compliance with Sonatype: Automating reporting for U.S. Army SBOM requirements

We've been closely following the regulatory response to the increasing frequency with which cybersecurity attacks target software supply chains ...
Palo Alto, quantum, cryptography, quantum, computing, AI, DigiCert encryption,QKD quantum D-Wave

NIST Releases Post Quantum Cryptography Standards

| | Federal, NIST, PQC, QKD, quantum, standards
The National Institute of Standards and Technology (NIST) released its first three post-quantum cryptography (PQC) standards, a world-first designed to meet the threat of powerful quantum computers as well as the increasing ...
Security Boulevard

White House Memo Pushes Federal Agencies on Cybersecurity

On July 10th, the White House released Memorandum M24-14, giving administrative agencies guidance for cybersecurity priorities when building FY26 budgets.  The […] ...

How AttackIQ Can Bolster CORA Compliance in the Federal Government

Federal agencies need strong security controls and continuous compliance. The Cyber Operational Readiness Assessment (CORA) by the DHS and industry partners enhances critical infrastructure resilience against cyber threats. The post How AttackIQ ...

“Mission Possible”: How DTEX is Supporting National Security from the Inside Out

When considering the most significant cyber threats to the public sector, many immediately think of foreign adversaries breaching federal agencies. This perception is understandable, as nation-state cyber attacks often dominate headlines. However, ...

Zero Trust Meets Insider Risk Management

What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in some capacity, and all three used their insider access for nefarious purposes, ...
Cyber readiness and SBOMs

Cyber readiness and SBOMs

The Advanced Technology Academic Research Center (ATARC) recently hosted the webinar "Unlocking Cyber Readiness with SBOMs," focusing on the essential role of software bills of materials (SBOMs) in enhancing cybersecurity frameworks across ...
Secure Software Development Attestation Form: Sonatype helps you comply

Secure Software Development Attestation Form: Sonatype helps you comply

On March 11, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the Office of Management and Budget (OMB) unveiled the final version of the Secure Software Development Attestation Form. This pivotal ...
Securing software development with Sonatype Air-Gapped Environment (SAGE)

Securing software development with Sonatype Air-Gapped Environment (SAGE)

Developers everywhere build modern applications from reusable pieces of code downloaded from repositories such as Maven Central ...
FBI Warns of Adversary Malicious AI Use While Encouraging AI Cyber Adoption

FBI Warns of Adversary Malicious AI Use While Encouraging AI Cyber Adoption

A briefing by the FBI’s Counterintelligence Division highlights the massive potential of artificial intelligence (AI) for advancing cybersecurity and the looming risks of adversaries weaponizing AI for attacks ...