Securing the Software Supply Chain with Metadata - Part 1 - What and Why
2023-10-10 00:00:00 +0000
Recent years have witnessed a meteoric rise in Software Supply Chain (SSC) attacks. The 8th Annual State of the Software Supply Chain Report by Sonatype reported a 742% annual increase in SSC attacks since 2019. An SSC attack involves a two-pronged approach: an upstream attack, where malicious code infiltrates a...
Read More
How to find your point and improve your presentations
2022-07-10 00:00:00 +0000
Imagine that recent presentations from you or your team have fallen flat. You were not able to get your point across. Your audience was bored and disengaged. How would you improve? You might believe that your PowerPoint slides are the root cause. In this case, your solution might involve buying...
Read More
2020-07-19 00:00:00 +0000
Lessons from Mortimer J. Adler Recently, a medical scare pushed me back to working from home for a while. When you don’t travel to and from an office, you suddenly have a couple of extra hours daily. So, like any (in)sane people with(out) a life, I spent the time reflecting...
Read More
2020-03-14 00:00:00 +0000
Blockchain technologies have been increasingly adopted by enterprises to increase operational efficiency and enable new business models. These enterprise blockchain applications generally run on dedicated blockchain networks due to regulations and security requirements. The design process of these networks involves many decisions and trade-offs that impact security, governance, and performance...
Read More