Getting Physical with Cybersecurity

Getting Physical with Cybersecurity

LAS VEGAS – Security doors and cameras, alarms and biometrics, smart locks and drones, were some of the security device types on display at ISCWest (International Security Consortium West) 2025 at the ...
How SBOMs power secure software acquisition | Sonatype Blog

How SBOMs power secure software acquisition | Sonatype Blog

CISA's Supply Chain Integrity Month reminds us of an undeniable truth about modern software development: transparency in software supply chains is no longer optional. The theme of week 4 is "Transparency: Securing ...
Will the FDA Start Banning Chinese-Made Medical Devices?

Will the FDA Start Banning Chinese-Made Medical Devices?

Interview with Joe Silvia, CEO of MedWare Cyber Click here to listen. In late January, the FDA issued a safety warning on Contec CMS8000 patient monitors and those relabeled as MN-120. The ...
Everything in C with Tanya Janca

Everything While Training: Lessons on C and C++ Secure Coding Practices with Tanya Janca

Click here for full interview. In this show, we speak with Tanya Janca, aka SheHacksPurple, a renowned code security trainer with nearly 30 years of experience in application development, engineering, and testing ...
The hidden threat: Tackling malware in your software supply chain

The hidden threat: Tackling malware in your software supply chain

The value of open source is undeniable — 90% of all modern software development depends on it. According to Harvard Business School, in 2024 alone, more than 6 trillion open source software ...

U.S. Bans Software and Firmware Products From Adversarial Countries

In January 2024, U.S. law went into effect that would ban smart cars with Russian and Chinese technology and protect the vehicle supply chain due to concerns about the privacy of consumer ...
Securing multi-environment deployments: Cloud, on-premise, and air-gapped

Securing multi-environment deployments: Cloud, on-premise, and air-gapped

Modern software delivery makes use of many different deployment environments, from public cloud to private cloud and traditional on-premise data centers to highly secured air-gapped systems. Organizations take advantage of multiple deployment ...
AI Wars Playing Out in Application Attacks and Defenses

AI Wars Playing Out in Application Attacks and Defenses

Deb Radcliff interviews Bugcrowd founder and white hat hacker, Casey Ellis. As if protecting applications wasn’t tough enough, attackers are now leveraging AI to find and exploit application vulnerabilities faster, outpacing patch ...
Assessing your open source software security efficacy

Assessing your open source software security efficacy

Open source software has become the foundation of modern application development. With up to 90% of most applications consisting of open source components, organizations — especially in financial services — need to ...