ZeronWhy Your Organization Can’t Afford to Ignore SBOM for Software SecurityIn an age where cyber threats are escalating and software supply chains are increasingly complex, the need for a robust security framework…1d ago
Taylor ArmerdinginNerd For TechReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
SOCFortressSBOM (Software Bill of Materials) — Part II, Reports Using Syft and Grype.Need Help?5d ago5d ago
Daniel StrebelinGoogle Cloud - CommunityKYC - Know your Container(image) with SLSA, SBOM and Binary AuthorizationIn this blog post we take a practical spin at container security and look at SLSA buid attestations, SBOM, and Binary Authorization in GCP.Nov 2, 2023Nov 2, 2023
ZeronWhy Your Organization Can’t Afford to Ignore SBOM for Software SecurityIn an age where cyber threats are escalating and software supply chains are increasingly complex, the need for a robust security framework…1d ago
Taylor ArmerdinginNerd For TechReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
SOCFortressSBOM (Software Bill of Materials) — Part II, Reports Using Syft and Grype.Need Help?5d ago
Daniel StrebelinGoogle Cloud - CommunityKYC - Know your Container(image) with SLSA, SBOM and Binary AuthorizationIn this blog post we take a practical spin at container security and look at SLSA buid attestations, SBOM, and Binary Authorization in GCP.Nov 2, 2023
Jean-Philippe GouinHow to handle SBOMs at scale in K8SToday there is a (good) hype about Secure Supply chain software in a cloud native environment. Learn how to manage SBOM complexity at scaleApr 8
Tom HenricksenThe Truth About Software Bill of MaterialsEarly in my career open source software became popular. One of the first things we used was log4j. It was an easy-to-use logging framework…Sep 24
Ata SerenCreating a DevSecOps pipeline with Jenkins — Part 2This is the part 2 of my journey in creating a robust DevSecOps pipeline by using Jenkins and various tools.Jul 42