OWASP’s checklist provides a concise and quick resource to help organizations and security leaders deal with generative AI and LLMs.
Software suppliers and consumers alike will increasingly need to be familiar with global requirements and regulations designed to mitigate software supply chain attacks.
Open-source software is ever vulnerable to malicious actors, but software bills of material can help mitigate the threat. NSA guidance sets a solid foundation for managing the ecosystem.
The push to create more detailed, reliable, and mature BOMs with sufficient detail and depth to counter supply chain attacks continues to advance with the latest OWASP model.
Key recommendations from the NIST’s latest guidance and why they are relevant to modern organizations developing and delivering software.
CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem.
The soon-to-be-released scoring system update has promise, but challenges remain for it to deliver exactly what CISOs need to get ahead of the latest vulnerabilities.
The third iteration of the Exploit Prediction Scoring System helps security teams prioritize vulnerabilities through prediction.