タグ: vulnerability management

Adam Shostak- LTOOD

What Video Games and Star Wars Can Teach Us About Threat Modeling with Adam Shostack

This article is based on Adam Shostack’s interview on the Left to Our Own Devices podcast.   Adam S […]

SBOM & Beyond- Part 3

Keeping the Software Supply Chain Accountable with SBOMs

What will your team do if a software component or a supplier’s entire software suite becomes untrustwort […]

LTOOD Joe Weiss

The Importance of Including Engineers in Industrial Product Security With Joe Weiss

From a nuclear meltdown to Y2K and 9/11, Joe Weiss paints a frightening picture of cyber vulnerabilities in th […]

How SBOMs Can Forecast Product Security Storms

The Product Security community has had a rough go of it lately.  Ransomware attacks, New regulation, Greater i […]

Building and Applying A New Medical Device Framework With Phil Englert

Phil Englert was ahead of the curve in introducing cybersecurity into the medical device industry, building me […]

Cybellum FIC

Cybellum and FIC Partner to Expand Vehicle Cybersecurity Offering in Asia Pacific

This partnership provides automotive industry domain-specific cybersecurity expertise and solutions for enhanc […]

Flex the VEX Emoji

Flex the VEX: A Better Way to Secure Products

VEX reports have finally hit the mainstream and the excitement surrounding them has as much to do with automat […]

LTOOD: Thomas LaRock

Insights From a Nation State Software Supply Chain Attack With Thomas LaRock

Two years following one of the worst cyber-espionage attacks on the USA, we sat down with Thomas LaRock from S […]

PR- Version 2.22

Cybellum Transforms SBOM Management and Compliance Oversight for Manufacturers with New Release of its Product Security Platform

Advanced workflow, approval process and management dashboard enhance control, distribution and supervision, wh […]

Subscribe to our blog to stay updated