The Fast Company Executive Board is a private, fee-based network of influential leaders, experts, executives, and entrepreneurs who share their insights with our audience. Software development is ...
The rise of cyber attacks against software companies such as SolarWinds and the discovery of security vulnerabilities in popular open source software like Log4j used in critical systems have cast the ...
The software supply chain, an entire network of components, tools, and processes used to develop, build, and deliver software, has evolved into a new, very popular attack surface, granting ...
Malicious campaigns targeting code used by developers of AI applications underscore the need to develop comprehensive risk-based programs around software dependencies and components. Widespread flaws ...
Software supply chain attacks are becoming more frequent and introducing bigger consequences. This highlights the need for a structured response by policymakers and the security community, which is ...
Last year’s MOVEit and 3CX vulnerabilities offered a stark reminder of the risk insecure VPN appliance pose today. Threat actors exploit vulnerabilities to infiltrate a software provider’s network and ...
The Fast Company Executive Board is a private, fee-based network of influential leaders, experts, executives, and entrepreneurs who share their insights with our audience. It’s more important than ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More The software supply chain is not linear or simplistic: It is made up of ...
Software supply chain cyberattacks are more firmly in the spotlight thanks to several recent high-profile attacks with global impact. According to an Identity Theft Resource Center report, "more than ...
Too many fulfillment networks are built for a time that no longer exists. They work when demand is predictable, but strain ...
This article, prepared in conjunction with AFCEA’s Technology Committee, is the first in a series of three articles addressing supply chain considerations of software and hardware. The second article ...
A major area of concern for IT security teams is how to tackle the challenges posed by the increasing use of third-party platforms and services. The need for security that spans third parties applies ...