Blog
On this blog , team members from Riscosity and invited security leaders share their thoughts on the state of the Digital Supply Chain.

Achieving GDPR Compliance in Cyber Security: What You Need to Know
The importance of understanding GDPR compliance in GDPR cyber security cannot be overstated. With the increasing prevalence and sophistication of digital threats, it is essential that organizations take steps to protect their data and networks from malicious...
The Evolution of 3rd Party Supply Chains for the Fintech Industry
If there is a seismic shift happening at a breakneck pace, the financial industry is feeling it. Oh yes, new banking products, new ways to use blockchain, ledgers, crypto banking - the...
Paging Healthcare Technology! What’s in your Supply Chain?
It's been over 20 years now since we as security professionals have been including SDKs in the software code that our development teams have been writing. In fact, looking at the ACM paper...
How SBOMs and The Digital Supply Chain Converge
Software development is not slowing down and neither are the demands for new features. In order to keep up with the needs of the market and competitive pressure, Software Engineers have...

What is application risk assessment and how do you perform it?
What is application risk assessment? Application risk assessment is the process of evaluating and understanding the security risks associated with an application. This metric is used to help...

Securing the Digital Supply Chain – Why are Investors interested in the digital supply chain
In this session for Securing the Digital Supply Chain, we talk to two very well-known investors from Silicon Valley - Mahendra Ramsinghani (Secure Octane) and Cherian Mathew (Firebolt VC). We learn...
Subscribe to our newsletter to learn more about supply chain security and get informaed about the latest Riscosity features and industry trends.
Vendor Risk Management – Benefits, Process, Software & Tools
What is vendor risk management? Vendor risk management is a process that helps businesses manage the risks associated with their vendors. Vendor risk management involves understanding and...
A Comprehensive Guide to Open-Source Security – Components, Code, and Tools
What is open source security? Open source security is a term used to describe the process of protecting your organization's data and network from attack by using open-source software. Open...
What is SBOM (Software Bill of Materials) and why do you need it
Why do organizations need a software Bill of Materials? A Software Bill of Materials (SBoM) is a document that lists all of the software components and their versions that are used in the...
What is application risk assessment and how do you perform it?
What is application risk assessment? Application risk assessment is the process of evaluating and understanding the security risks associated with an application. This metric is used to...
Understanding and Managing Your Shadow Liability in 5 Minutes
Understanding Risk is a complicated subject. In the world of Information Technology, the FAIR framework is well accepted. However there are some areas of operational risk that are simple...
API Security is the “David S. Pumpkins” Of Security Programs
There we go - Anirban is at it again! What now? Saturday Night Live (SNL) has a great skit based on a character played by veteran artist- Tom Hanks. I call this the "David S Pumpkins"...