2014 was a year of many firsts. Rosetta's Philae lander made the first successful landing on a moving comet, Janet Yellen was ...
As cybercrime continues to evolve in scope, the threat posed by vulnerabilities within the IT supply chain cannot be ...
Call for Presentations (CFP) is open for the 2025 Supply Chain Security & Third-Party Risk Summit, taking place virtually on ...
Backline, a new security startup that uses AI agents to automatically remediate security vulnerabilities, is coming out of ...
Fans of The Big Lebowski know the movie’s narrator introduces the protagonist as "the man for this time and place." ...
AI Model Discovery roots out models in use, assesses their safety, and enforces use policies — but only if they are from ...
An increase in compliance activities such as the creation of software bills of materials (SBOMs), performing software ...
The DORA compliance deadline is here, transforming how banks and their software suppliers approach resilience, security, and software automation ... Explore how software supply chain management ...
Valence Security and Endor Labs have introduced extensions to their existing platforms specifically to tackle the ...
Binarly, a leader in firmware and software supply chain security, today announced the release of its flagship Binarly Transparency Platform v2.7, a major update that immediately enables corporate ...
A new US Commerce Department rule banning Chinese and Russian hardware and software in internet-connected vehicles takes ...