Topics
Events
Podcasts
Research
Recognition
Leadership
About CRA
Supply chain

Test Analysis editorial

SC StaffJuly 8, 2021
SC Staff
SC Staff

Related

A committee of Ukrainian leaders, rabbis and other religious figures participate in a protest in front of the U.S. Mission to the United Nations on March 16, 2022, in New York City. (Photo by Spencer Platt/Getty Images)
Application security
What happens when ‘protestware’ sabotages open source in response to current events?

Joe UchillMarch 17, 2022

New software supply chain concerns emerged in the open-source community when a popular Javascript library began to delete all files on systems in Belarus and Russia as a protest to the war in Ukraine.

Today’s columnist, Sandeep Lahane of Deepfence, writes that a runtime SBOM can fulfill the promise of the Biden administration’s cybersecurity executive order. (Credit: Getty Images)
Supply chain
Add runtime to an SBOM for even stronger security

Sandeep Lahane March 10, 2022

A dynamic, runtime SBOM aims to protect the software supply chain.

A woman pays cash while wearing gloves at Northgate Gonzalez Market on March 19, 2020, in Los Angeles. (Photo by Mario Tama/Getty Images)
Ransomware
Ransomware seen as No. 1 threat of financial organizations

Steve ZurierMarch 3, 2022

F-Secure study says financial companies are concerned about ransomware, supply chain attacks, cloud security adoption challenges, and risks from financial technologies such as SWIFT, Open Banking, and ATMs.

Related Events

  • Cybercast
    Practical advice for protecting your digital supply chain: A realistic top 5 list

    On-Demand Event

  • Cybercast
    Cyber Crisis Simulation: Supply Chain Pain

    On-Demand Event

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.