+44 (0)203 88 020 88

Menu

Search

Web Applications

Exploring the OWASP Software Assurance Maturity Model (SAMM)

The OWASP Software Assurance Maturity Model (SAMM) was first introduced in 2009 by Pravir Chandra as a practical guide to developing secure software. Since its inception, SAMM has evolved to keep pace with emerging technologies, threats, and industry standards. The most recent iteration of SAMM (Version 2.0), refines its structure and expands its applicability to […]

Exploring the OWASP Software Assurance Maturity Model (SAMM) Read More »

What are software supply chain attacks?

Software Supply chain attacks – do you know what you are importing? Many websites and applications routinely import additional code modules from external repositories.  These could be javascript libraries for a webpage or source code for an application. Two recent incidents illustrate the risks of supply chain attacks against the code of your applications and

What are software supply chain attacks? Read More »

0

No products in the basket.

No products in the basket.