Supply chain attacks: Mitigation and protection

In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical cyber attacks, supply chain attacks provide two major advantages to attackers. F… Continue reading Supply chain attacks: Mitigation and protection

Intertrust and Jscrambler launch joint solution to protect mobile and JavaScript applications

Intertrust Technologies and Jscrambler announced a jointly-sourced product suite App Shield 360 that provides a set of application shielding solutions for both native and JavaScript applications that includes: Jscrambler to provide leading JavaScript w… Continue reading Intertrust and Jscrambler launch joint solution to protect mobile and JavaScript applications