Making the Case for Supply Chain Behavior Transparency

The Biden Administration’s Cyber Executive Order includes a Software Bill of Materials (SBOM), an electronically readable format designed to provide an inventory of third-party components that make up software components.  It is a critical and necessa… Continue reading Making the Case for Supply Chain Behavior Transparency

How to Prevent Breaches by Protecting Your Attack Surface

Preventing breaches begins with understanding and protecting your attack surface. For most enterprises, their attack surface is huge. To help wrangle it, security professionals have struggled for years to use tools such as network mapper (nmap) or vul… Continue reading How to Prevent Breaches by Protecting Your Attack Surface

Reading the Application Security Tea Leaves – How to Interpret the Analyst Reports

There are a number of industry analyst reports on application security.  Each analyst firm and report takes its own slice of the market to analyze and report on vendors within that market.  For example, the Forrester Wave focuses on Static Application… Continue reading Reading the Application Security Tea Leaves – How to Interpret the Analyst Reports