These tools will help identify vulnerabilities and threats posed by third-party code through software composition analysis and SBOM creation. As the fallout from the Apache Log4J vulnerabilities ...
Software supply chain cyberattacks are more firmly in the spotlight thanks to several recent high-profile attacks with global impact. According to an Identity Theft Resource Center report, "more than ...