Securing the Software Supply Chain offers a comprehensive exploration into this critical field. As technical professionals, understanding the evolving landscape of supply chain security is paramount. Understanding what supply chain security is, when and how to implement controls, and why you are doing so, along with the bottom turtle problem, and the concept of trust in a zero-trust world are all key takeaways. By grasping these concepts, and more, we can better protect our software, systems, and users, ultimately fortifying our organizations against the ever-increasing threats in the digital supply chain.
Get your copy of Securing the Software Supply Chain now! Dive deeper into the lessons discussed here, and many more, to ensure your supply chain stays safe and protected.
This book will upgrade your PHP code by highlighting the errors, antipatterns, and security weaknesses common to PHP applications.
Implementing and Exploiting Cryptography details dozens of practical cryptographic implementations and then breaks down the flaws that adversaries use to exploit them.
Welcome to edge computing. This article covers the introduction to the edge. Read on to find out what edge computing is (and isn’t), how it’s different from the cloud, and where and how it’s used.
This excerpt covers cybersecurity as an infinite game, the shared responsibility model, Azure security services, the threat landscape, cloud security challenges, the Zero Trust security model, and the defense in depth concept.
From AWS Security by Dylan Shields
This article deals with securing access to your AWS account.
An excerpt from Managing Machine Learning Projects by Simon Thompson
Managing Machine Learning Projects will teach you to guide machine learning projects from design to production—no machine learning experience required!
Read this article if you’re a project manager who works with machine learning applications.
An excerpt from Secret Key Cryptography by Frank Rubin
This article covers:
• Basic terms used in cryptography
• What is an unbreakable cipher?
• What are the different types of cryptography?
Read it if you’re interested in cryptography.
From the Application Security Program Handbook by Derek Fisher
This article discusses where security fits into the DevOps process along with some common approaches.
Read it if you want to learn more about baking security into DevOps.