• NSSS24: Photographs

    NSSS24: Photographs

    Here are some photographs from the Nordic Software Security Summit 2024. On Monday Sept 23 there was a single track and on Tuesday the conference was split up in two tracks.

  • NSSS24: Summary of day two

    NSSS24: Summary of day two

    Anthony Harrison, APH10 The second day of the Nordic Software Security Summit didn’t disappoint with more great presentations and stimulating discussions. It was great to see the community sharing knowledge in areas such as improving testing and the use of digital signatures as well as developing solutions to make the […]

  • NSSS24: Summary of the first day

    NSSS24: Summary of the first day

    Anthony Harrison, APH10 What a great day at the first Nordic Software Security Summit#nsss24 organised by Olle E Johansson. Great presentations, thought provoking discussions and a great community. So what were the key takeaways from Day 1? 🎯 There are many challenges in developing a ‘must have’ Open Source application […]

  • Will the CRA improve Cyber Security in the European Union?

    Will the CRA improve Cyber Security in the European Union?

    One of the goals with the EU Cyber Resilience Act is to improve cyber security in the EU and by doing that, lower the costs for incidents. By pushing the responsibility to the vendors, making them prioritise the security of their user and customers, the CRA will be a huge […]

  • New last minute agenda addition: What really happened to kernel.org in 2011?

    New last minute agenda addition: What really happened to kernel.org in 2011?

    Leif Nixon will tell an old story that hasn’t been told in public before. In 2011, the kernel.org infrastructure was severely compromised, sending shock waves through the Linux kernel community. Despite promises, no detailed incident report was ever released. It is time to tell the full story; the background, the incident itself, […]

  • Introducing Our Silver Sponsor: Wallarm

    Introducing Our Silver Sponsor: Wallarm

    Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio. Our unified, automated API security solution works with any platform, any cloud, multi-cloud, cloud-native, hybrid and on-premise environments. Enterprises such as Miro, Revenera, Panasonic and Semrush have […]

  • Introducing our Gold Sponsor: Endor Labs

    Introducing our Gold Sponsor: Endor Labs

    We’re happy to introduce you to our Gold Sponsor: Endor Labs. Endor Labs secures everything your code depends on throughout the SDLC. Start by creating a more efficient and effective dependency management program with consolidated reachability-based SCA, SAST, container scanning, artifact signing, and CI/CD security. Reduce security tool noise by […]

  • Do we need to shift legal left?

    Do we need to shift legal left?

    Johanna is one of our speakers at the Nordic Software Security Summit in September. She will talk about the legal department’s role in the work to comply with the new requirements coming with the EU Cyber Resilience Act. Master of Law, Sociologist, and Ph. Licentiate in Media Sciences, Johanna Parikka […]

  • The Cyber Resilience Act will have a huge impact on the software business model – are you ready?

    The Cyber Resilience Act will have a huge impact on the software business model – are you ready?

    One of the main pillars of the EU Cyber Resilience Act (CRA) is to make sure that manufacturers take responsibility for their customer’s cyber security and resilience. Today a vendor can give instructions to the customer on how to protect themselves by applying firewall and other protective measures while the […]

  • CycloneDX is now an ECMA standard

    CycloneDX is now an ECMA standard

    CycloneDX v1.6 has become an ECMA Standard. The decision was taken by the ECMA General Assembly June 26, 2024. This is important for all the work going on with worldwide regulations requiring vendors to assume more responsibility for their user’s security, making sure their software is secure by design and […]