The Fast Company Executive Board is a private, fee-based network of influential leaders, experts, executives, and entrepreneurs who share their insights with our audience. It’s more important than ...
This article, prepared in conjunction with AFCEA’s Technology Committee, is the third in a series of three articles addressing supply chain considerations of software and hardware. The first article ...
The latest edition of Suse’s Securing the cloud report has found that almost every IT decision-maker polled is concerned about the security risks associated with their software supply chain. The 2024 ...
Supply chain security continues to receive critical focus in the realm of cybersecurity, and with good reason: incidents such as SolarWinds, Log4j, Microsoft, and Okta software supply chain attacks ...
Geoffrey Mattson is the CEO of Xage Security, delivering zero-trust access and protection that’s easy to deploy, manage, and use. In recent years, open-source software has become deeply ingrained in ...
The software supply chain, an entire network of components, tools, and processes used to develop, build, and deliver software ...
Software supply chain management startup Lineaje announced today that it has raised $20 million in new funding to advance its artificial intelligence capabilities, deliver secure open-source software, ...
In the beginning, we identified two major types of software supply chain attacks and nine minor types. The world keeps insisting on a broader definition. In the spring of 2020, it really mattered to ...
Software supply chain security startup Kusari Inc. announced today that it has raised $8 million in new funding to accelerate the development of its software supply chain security solutions. Founded ...
The software supply chain can't catch a break, security-wise. Despite multiple organizations making claims they'd make security a higher priority than features as they developed new software, AI ...
Log4j, maybe more than any other security issue in recent years, thrust software supply chain security into the limelight, with even the White House weighing in. But even though virtually every ...
Last year’s MOVEit and 3CX vulnerabilities offered a stark reminder of the risk insecure VPN appliance pose today. Threat actors exploit vulnerabilities to infiltrate a software provider’s network and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results