
Threat Modeling Your Dependencies - Part 2
Mitigating Third-Party Component Risk: Swapping the Cancer for...

Mitigating Third-Party Component Risk: Swapping the Cancer for...

How One Bad Library Can Poison Your Entire...

I’ve been talking about graphs for dependency analysis...

Prioritising remediation of vulnerabilities based on effective impact and risk using PageRank.