The importance of understanding GDPR compliance in GDPR cyber security cannot be overstated. With the increasing prevalence and sophistication of digital threats, it is essential that organizations...
Anirban Banerjee
The World’s First Software Supply Chain Management Platform makes it easy for Security.
Mastering Third Party Risk Assessments: Best Practices and Tips
As businesses increasingly rely on third-party vendors to complete their operations, they must remain vigilant in understanding the potential risks associated with those partnerships. Third party...
How does the security supply chain helps with 21 CFR Part 11 Compliance? Everything you need to know!
The Security Supply Chain is playing a crucial role in digital security compliance. This article will explore how the supply chain helps with CFR Part 11 which was created to help companies protect...
What is HIPAA and the HIPAA Privacy Rule?
The HIPAA Privacy Rule is a federal law that protects the privacy of health information and establishes standards for business practices. Signed in 2001, it covers all forms of protected health data...
Software Supply Chain Risk Management: Identifying and Mitigating Risks in ICT (Information and Communications Technology) Software
Can you imagine a world without software? No, neither can I. The same goes for many other technology-based products, such as cell phones. Software is everywhere and it’s critical to businesses of...
Vendor Risk Management – Benefits, Process, Software & Tools
What is vendor risk management? Vendor risk management is a process that helps businesses manage the risks associated with their vendors. Vendor risk management involves understanding and managing...
A Comprehensive Guide to Open-Source Security – Components, Code, and Tools
What is open source security? Open source security is a term used to describe the process of protecting your organization's data and network from attack by using open-source software. Open source...
What is SBOM (Software Bill of Materials) and why do you need it
Why do organizations need a software Bill of Materials? A Software Bill of Materials (SBoM) is a document that lists all of the software components and their versions that are used in the...
What is application risk assessment and how do you perform it?
What is application risk assessment? Application risk assessment is the process of evaluating and understanding the security risks associated with an application. This metric is used to help...
Understanding and Managing Your Shadow Liability in 5 Minutes
Understanding Risk is a complicated subject. In the world of Information Technology, the FAIR framework is well accepted. However there are some areas of operational risk that are simple to...
API Security is the “David S. Pumpkins” Of Security Programs
There we go - Anirban is at it again! What now? Saturday Night Live (SNL) has a great skit based on a character played by veteran artist- Tom Hanks. I call this the "David S Pumpkins" (DSP) series....
NIST Guidance – Defending Against Software Supply Chain Attacks
In this article, we will provide a breakdown of the NIST guidance for defending against software supply chain attacks. A software supply chain attack occurs when a cyber threat actor infiltrates a...
What is Digital Supply Chain Security and Why is it Important?
Ever since the coronavirus pandemic began, people have been talking about how businesses have been moving online more and more. However, this development only accelerated and brought attention to a...
Threat Landscape for Supply Chain Attacks By ENISA
The ENISA report aims at mapping and studying the supply chain attacks that were discovered from January 2020 to early July 2021. Based on the trends and patterns observed, software supply chain...
What is the NIST 800-128 SSDF 1.1 – Secure Software Development Framework
The NIST 800-128 SSDF documentation describes a set of fundamental, sound practices for secure software development called the Secure Software Development Framework (SSDF). Organizations should...
Easily Understanding Developer Verification Of Software Based On Executive Order 14028 – NISTIR 8397
Software development is akin to building a beautiful work of art. It requires focus, expertise, and talent. The software development process needs to be nurtured with the right support, but is it?...
Securing the Digital Supply Chain – Why are Investors interested in the digital supply chain
In this session for Securing the Digital Supply Chain, we talk to two very well-known investors from Silicon Valley - Mahendra Ramsinghani (Secure Octane) and Cherian Mathew (Firebolt VC). We learn...
Riscosity Announces SafeChain(TM) Certification Program
Enabling Sales Teams To Close Deals Faster by Demonstrating Attestation for Secure Data Tracking, Security and Management With 3rd Parties The team at Riscosity has been helping enterprises,...
The Evolution of 3rd Party Supply Chains for the Fintech Industry
If there is a seismic shift happening at a breakneck pace, the financial industry is feeling it. Oh yes, new banking products, new ways to use blockchain, ledgers, crypto banking - the number of new...
Securing The Digital Supply Chain – Episode 1
In this episode of Securing the Digital Supply Chain Anirban Banerjee , CEO, and co-founder of Riscosity talks to Atif Yusuf and Ravi Gunturi, two well-known security leaders in the San Francisco...
Riscosity – Next Generation Software Security Startup comes out of stealth
Riscosity, a software security startup, setting up its base in the San Francisco Bay Area announced today that it was launching publicly available services for enterprise and small to medium...
Paging Healthcare Technology! What’s in your Supply Chain?
It's been over 20 years now since we as security professionals have been including SDKs in the software code that our development teams have been writing. In fact, looking at the ACM paper from the...
How SBOMs and The Digital Supply Chain Converge
Software development is not slowing down and neither are the demands for new features. In order to keep up with the needs of the market and competitive pressure, Software Engineers have become adept...
Subscribe to our newsletter to learn more about design, our blog and other things we like to share.