Recommended blog posts
You might be interested in the following related posts.
Threat landscape and cybersecurity trends we anticipate
Beware of insecure-by-default libraries!
Top cyberattack and prevention trends this year
Learn the types, tools, techniques, principles and more
Now we follow all best practices required by OpenSSF
Outstanding incidents of this type of crime since 2011
Among exposed were secrets, code and AI training data
Towards an approach that engages more than SCA and SBOM