Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Top Challenges With Shifting Security to Development Melinda Marks, Enterprise Strategy Research Group (ESG) & Tim Mackey, Synopsys With modern processes, software developers can quickly build and release applications by deploying them to the cloud. But security teams are strugglin... 2 weeks ago | 53 mins Supply Chain Security Snags Tim Mackey, Principal Security Strategist The executive order issued by the White House last year calls for more robust software supply chain protections for federal agencies. Meanwhile, compa... 2 months ago | 54 mins Demystifying SBOM: More Than Just an Artifact? Mike McGuire, Senior Software Solutions Manager | Michael White, Technical Director and Principal Architect Software supply chain risk and software Bills of Materials (SBOMs) are top of mind across almost industry today. You’ve probably been bombarded with m... 3 months ago | 57 mins Open Source: A Key Link in the Software Supply Chain Anthony Decicco, GTC Law Group Open source makes the world go round. It’s easy to use and simple to plug in. Used correctly, it gives you the competitive edge you need to focus more... 4 months ago | 41 mins DAST to the Future Jeff Lawson, Product Management | Patrick Carey, Product Marketing Shifting the Modern Application Security Paradigm The emphasis on securing applications in development has not resulted in the reduction of breaches ... 2 months ago | 57 mins Resilience Against Cyber Attacks, Easily Stop Malware Before It’s too Late Brian Fox, Sonatype Modern day software relies heavily on open source coding components. Software supply chain attacks have increased an average 742% per year over the la... May 31, 2023 6:00pm Easily Stop Malware, Before Your Company Becomes Liable (and Broke) Brian Fox and Tara Flynn Condon Governments around the world are making secure software development an organizational imperative. For instance, proposed regulations like the EU Cyber... 3 days ago | 29 mins Breaking down the United States National Cybersecurity Strategy Taylor Armerding, Security Advocate | Tim Mackey, Principal Security Strategist Pillar three of the United States National Cybersecurity Strategy calls for the executive and legislative branches to shape market forces to drive sec... 3 weeks ago | 8 mins Develop Software Fearlessly Software Supply Chain Security in 2023 Brian Fox (Sonatype), Stephen Magill (Sonatype), Katy Hiller (Sonatype) Malicious software supply chain attacks have increased an average of 742% per year since 2019. As this trend continues, you'll need to know how to eff... 3 weeks ago | 29 mins Threat Actors Want Access to Your SDLC -- Here's How to Secure Them Mandeep Singh (Sonatype), Tim Vrablik (Sonatype) Bad actors are increasingly finding new ways to disrupt the software development supply chain. Whether via dependency confusion, typosquatting, or mal... June 8, 2023 11:00am Load more