By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
What is an SBOM? Exploring SBOM Origins and Use in Software Security
In this blog post, we'll break down what an SBOM is, where they came from, and how recent legislation has outlined their use in software supply chain security.
The Hacker Mind Podcast: When Old Medical Devices Keep Pre-Shared Keys
You'd think there's an end-of-life procedure to erase personal health and network configuration information from medical devices. Deral Heiland says otherwise.
Lessons from the New Martians: Evolving Through Your Graduate School Years
In 2003, I arrived in the CMU computer science department for my PhD along with 30 other students. I call it the class of the New Martians. Here's why.