Blog
Contact Us
Scribe Solutions
Scribe Hub
Heyman – AI-Powered Chatbot
Use Cases
Compliance With Software Supply Chain Regulations & Standards
Manage and Control Open Source Risk in Your Supply Chain
Manage Supply Chain Risks in an On-Prem Use Case
CI/CD Risk Management
Risk Management by Consumers
Securing pipelines
Secure Public Cloud Utilization
Outsourced SW Dev Security Validation
Remote Collaboration
Gaining SDLC Visibility & Control in M&A Deals
Harnessing AI-Driven Development, Without Compromising Security
Pricing
Why Scribe
SCRIBE vs. Typical ASPM
Scribe vs. Traditional SCA
Scribe vs. SBOM Management
ROI calculator
Docs
Resources
Resource Library
Search by asset type
Case Study
Blog
Guide
Webinars
Whitepapers
Training
Video
Podcast
Infographic
Knowledge Center
Search by Topic
Software Supply Chain Security
Software Bill of Materials
Software Supply Chain Regulations & Standards
Scribe Security Solutions
Company
About Us & Leadership
Careers
News & Updates
Book a Demo
Login
Home
Resources
Software Supply Chain Security Knowledge Center
Software Supply Chain Security Knowledge Center
Software Supply Chain Security
Read more
Software Supply Chain Risks
Read more
Software Supply Chain Attacks
Read more
NIST SSDF Framework
Read more
SLSA Cybersecurity Framework
Read more
Software Composition Analysis
Read more
Software Supply Chain Security Best Practices
Read more
SDLC Security Best Practices
Read more
Mastering Software Supply Chain Security: A Comprehensive Guide to Discovery and Risk Mitigation
Read more
From Trust to Evidence Based continuous compliance in SSC
Read more
The Good, Bad & Beautiful: Software Supply Chain Trust, Risk & Compliance
Read more
Securing the Software Development Lifecycle and Supply Chain
Read more
Navigating Software Supply Chain Risk and Trust: The CISO Perspective
Read more
How to Secure Your Software Supply Chain
Read more
What must you do to secure your SSC in the US vs the EU?
Read more
Should you trust AI to protect your software supply chain
Read more
Improve Your Supply Chain Security Pipeline
Read more
The power of evidence-based attestations in software supply chain security
Read more
From Application Security to Software Supply Chain Security – Whitepaper
Read more
Software Supply Chain Security: All You Need To Know
Read more
Building transparent trust for the entire software supply chain with a security trust hub
Read more
SolarWinds CISO shares lessons learned & practical steps to secure your software supply chain
Read more
5 Things you should know to secure your software supply chain
Read more
Continuous Assurance and Software Supply Chain Security
Read more
Improving The Trust In The Software Supply Chain
Read more
Defending Against Recent Software Supply Chain Attacks: Lessons and Strategies
Read more
Would you go to battle without a map?
Read more
The Impact of AI on Software Supply Chain Security
Read more
Software Supply Chain Security: The Top 7 Best Practices You Need to Know
Read more
Practical Steps Towards Protecting Your MLOps Pipeline
Read more
What is ASPM?®
Read more
CI/CD Security Best Practices
Read more
How To Uphold Security Standards in the SDLC and Address SSDF Requirements
Read more
Using SBOM and Feeds Analytics to Secure Your Software Supply Chain
Read more
Striking Balance: Redefining Software Security with ‘Shift Left’ and SDLC Guardrails
Read more
A Secret Encounter in the Software Supply Chain
Read more
How To Avoid CVE Burnout and Alert Fatigue in Vulnerability Scans?
Read more
What Happens When an AI Company Falls Victim to a Software Supply Chain Vulnerability
Read more
Using the 3CX Desktop App Attack To Illustrate the Importance of Signing and Verifying Software
Read more
How Confident Are You With What’s Really Happening Inside Your CI/CD Pipeline? The Elements You Should Be Securing, and How
Read more
The story of the OpenSSL patch 3.0.7 and the lessons you can learn from it
Read more
From Vulnerability to Victory: Defending Your CI/CD Pipeline
Read more
What does the future hold for VEX? And how would it affect you?
Read more
From Application Security to Software Supply Chain Security: A Fresh Approach Is Needed
Read more
GitHub vulnerabilities parallel research
Read more
Graph for Understanding Artifact Composition (GUAC): Key highlights
Read more
Taking software supply chain security to the next level with the latest OMB memo
Read more
Don’t be the weakest link: The role of developers in securing the software supply chain
Read more
IconBust, a new NPM attack
Read more
What’s hiding in your code?
Read more
GitHub Cache Poisoning
Read more
Continuous Assurance: An Integral Practice for Software Supply Chain Security
Read more