Cyber Risk

Cyber Risk
Doron Peri Understanding and Meeting the New Federal Software Security Mandate: A Practical Guide

Understanding and Meeting the New Federal Software Security Mandate: A Practical Guide The landscape of federal software security is undergoing a significant transformation. In January 2025, the White House issued a new Executive Order focusing on strengthening the security and transparency of third-party software supply chains used by federal agencies. This mandate introduces crucial changes […]

Read more
Cyber RiskImage of magnifying glass over code
Danny Nebenzahl How to Integrate SBOMs Across the Entire SDLC

In today’s rapidly evolving software development landscape, security and compliance have become paramount. As organizations increasingly rely on third-party components and open-source software, understanding what’s inside your software has never been more critical. Enter the Software Bill of Materials (SBOM)—a detailed list of all components, libraries, and dependencies that make up your software. Integrating SBOMs […]

Read more
Cyber RiskImage of map and compass
Doron Peri Would you go to battle without a map?

Securing Your Software Supply Chain begins with the Discovery and Governance of Your ‘Software Factory’ In today’s software development environment, teams handle decentralized assets such as code repositories, build pipelines, and container images. While this distributed model offers flexibility and speeds up production, it also fragments assets and complicates governance and security oversight, especially as […]

Read more
Cyber RiskAn image of identifying vulnerabilities
Nir Peleg Identifying Vulnerabilities with a Software Bill of Materials: Ensuring Security, Transparency, and Compliance

With the increased complexity of software supply chains, managing and securing software components has become more challenging. To tackle this, a Software Bill of Materials (SBOM) has emerged as a crucial tool for ensuring security, transparency, and compliance in the software development lifecycle. An SBOM is a comprehensive record of all components used in creating […]

Read more
Cyber RiskAn image of futuristic cyber security
Doron Peri How Scribe Security Aligns with Gartner’s Leader’s Guide to Software Supply Chain Security

On June 20, 2024, Gartner released its influential Leader’s Guide to Software Supply Chain Security, highlighting the growing need to defend against software supply chain attacks. With these attacks’ increasing frequency and sophistication, organizations face significant risks that they must manage effectively. This post interprets the critical findings from Gartner’s report. It explains how Scribe […]

Read more
Cyber RiskAn image of AI and SSCS
Danny Nebenzahl The Impact of AI on Software Supply Chain Security

In an era where cyber threats are growing in both sophistication and scale, organizations are increasingly relying on artificial intelligence (AI) to strengthen their security frameworks. This trend is particularly significant in software supply chain security, where AI is becoming a crucial tool in identifying vulnerabilities, predicting emerging threats, and streamlining the development and deployment […]

Read more
Cyber RiskSCA vs SBOM banner
Nir Peleg SCA and SBOM: What’s the Difference?

That is associated with them in a given software application. Using SCA tools the entire codebase of an application is searched to find out all the open-source libraries and components used in the application, their versions are monitored and it also finds out the known vulnerabilities for those components.  Purpose of SCA The main objective […]

Read more
Cyber Risk
Doron Peri Comparing ASPM and CSPM: Understanding the Differences and Applications

It is critically important to secure Cloud Environments and Applications given that the world is now a global village. Two solutions that are critical for these purposes in organizations are Application Security Posture Management (ASPM) and Cloud Security Posture Management (CSPM). Each performs a security function, though they serve the function in different settings and […]

Read more
Cyber RiskAn image of compass over code
Doron Peri Navigating NSA’s SBOM Guidelines: Essential Steps for Effective Software Supply Chain Security

In today’s digital landscape, software security is paramount. The National Security Agency (NSA), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), has established comprehensive guidelines for Software Bill of Materials (SBOM) Management. These guidelines are crucial for organizations aiming to bolster their cybersecurity posture and mitigate risks in their software supply chain. Why […]

Read more
Cyber RiskBest practices image
Nir Peleg Software Supply Chain Security: The Top 7 Best Practices You Need to Know

In today’s interconnected digital landscape, ensuring the security of your software supply chain is paramount. The software supply chain encompasses all the processes and components involved in developing, building, and deploying software, and it is increasingly targeted by cyberattacks. Having worked with numerous companies and leveraging vast industry experience, I can confidently share some of […]

Read more
1 2 3 6