Ramesh Babu ChayapathiSBOM Securing the Software Supply Chain: Why SCA and SBOM Are Essential for Modern DevelopmentSoftware Composition Analysis (SCA) and Software Bill of Materials (SBOM) are essential tools for understanding and managing the security…3d ago
InNerd For TechbyTaylor ArmerdingReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
Divij SharmaJourney to the Grand Finale: Our Experience at Smart India Hackathon 2023The Smart India Hackathon (SIH) has always been a beacon of innovation, bringing together the brightest minds from across the nation to…Jan 17Jan 17
TahirWhy Every Modern Software Needs a Software Bill of Materials (SBOM) for SecurityLearn about the types of Software Bill of Materials (SBOM) — Design, Source, Build, Analyzed, Deployed, and Runtime — and how each…Oct 30Oct 30
InGoogle Cloud - CommunitybyDaniel StrebelKYC - Know your Container(image) with SLSA, SBOM and Binary AuthorizationIn this blog post we take a practical spin at container security and look at SLSA buid attestations, SBOM, and Binary Authorization in GCP.Nov 2, 2023Nov 2, 2023
Ramesh Babu ChayapathiSBOM Securing the Software Supply Chain: Why SCA and SBOM Are Essential for Modern DevelopmentSoftware Composition Analysis (SCA) and Software Bill of Materials (SBOM) are essential tools for understanding and managing the security…3d ago
InNerd For TechbyTaylor ArmerdingReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
Divij SharmaJourney to the Grand Finale: Our Experience at Smart India Hackathon 2023The Smart India Hackathon (SIH) has always been a beacon of innovation, bringing together the brightest minds from across the nation to…Jan 17
TahirWhy Every Modern Software Needs a Software Bill of Materials (SBOM) for SecurityLearn about the types of Software Bill of Materials (SBOM) — Design, Source, Build, Analyzed, Deployed, and Runtime — and how each…Oct 30
InGoogle Cloud - CommunitybyDaniel StrebelKYC - Know your Container(image) with SLSA, SBOM and Binary AuthorizationIn this blog post we take a practical spin at container security and look at SLSA buid attestations, SBOM, and Binary Authorization in GCP.Nov 2, 2023
Ata SerenCreating a DevSecOps pipeline with Jenkins — Part 2This is the part 2 of my journey in creating a robust DevSecOps pipeline by using Jenkins and various tools.Jul 42
Dana CraneRegulatory Compliance & Open Source SoftwareOpen Source Software (OSS) forms the majority of the codebase in any modern software application, but it’s rarely built for a specific…Oct 25