Aug 27, 2024 | Articles, Podcast
Open-source software is the building block of modern applications. From web frameworks to encryption tools, these readily available components offer developers a wealth of functionality and accelerate development cycles. However, this convenience comes with a hidden...
Aug 13, 2024 | Articles, Podcast
“Oh, I didn’t realise we were exposed to <vulnerability> as I didn’t think that application was using <open-source-component>.” I often heard such comments during the initial stages of our application security uplift. There was a lack of visibility on what...
Jul 24, 2024 | Articles, Podcast
Imagine you are a security manager being asked to do a security assessment on a new software for your organisation. It will be deployed across all Windows workstations and servers and will operate as a boot start driver in kernel mode, granting it extensive access to...
Apr 21, 2023 | Articles, Podcast, Posts
RSA Conference just published an article that I’ve written on the 5 steps for securing your software supply chain. Most modern applications are assembled from open source components with developers typically writing less than 15% of the code for their...
Feb 27, 2023 | Articles, Podcast, Posts
The Wall Street Journal has written an article that will challenge your belief on the security of your digital life. It reports on how a basic iPhone feature can allow criminals to steal your entire digital life. This basic feature is your pass code and the technique...