The ShiftLeft TeaminShiftLeft BlogReachability and Risk: Tools for Security LeadersBy Malcolm Harkins, Bryan Smith, Rob LundyMay 19, 20221May 19, 20221
The ShiftLeft TeaminShiftLeft BlogOkta’s Breach Highlights Risk of Putting Crown Jewels in the CloudBy Arun Balakrishnan, Sr. Director Product ManagementMar 24, 2022Mar 24, 2022
The ShiftLeft TeaminShiftLeft BlogImportance of Securing Software with a Zero Trust MindsetBy Shinesa Cambric, MicrosoftMar 22, 2022Mar 22, 2022
The ShiftLeft TeaminShiftLeft BlogSecure Software Summit: The State of OSS Supply Chain SecurityBy Dan Lorenc, ChainguardMar 17, 2022Mar 17, 2022
The ShiftLeft TeaminShiftLeft BlogSecure Software Summit Series: Focus on Preventative ReadinessBy Chetan ConikeeMar 8, 2022Mar 8, 2022
The ShiftLeft TeaminShiftLeft BlogSecure Software Summit FindingsShifting Security Left is a Work In ProgressMar 3, 20221Mar 3, 20221
The ShiftLeft TeaminShiftLeft BlogMalware Evolves to Present New Threats to DevelopersMalware, or code written for malicious purposes, is evolving.Feb 10, 2022Feb 10, 2022