TahirWhy Every Modern Software Needs a Software Bill of Materials (SBOM) for SecurityLearn about the types of Software Bill of Materials (SBOM) — Design, Source, Build, Analyzed, Deployed, and Runtime — and how each…Oct 30
InNerd For TechbyTaylor ArmerdingReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
Ata SerenCreating a DevSecOps pipeline with Jenkins — Part 2This is the part 2 of my journey in creating a robust DevSecOps pipeline by using Jenkins and various tools.Jul 42Jul 42
Dana CraneRegulatory Compliance & Open Source SoftwareOpen Source Software (OSS) forms the majority of the codebase in any modern software application, but it’s rarely built for a specific…Oct 25Oct 25
InGoogle Cloud - CommunitybyDaniel StrebelKYC - Know your Container(image) with SLSA, SBOM and Binary AuthorizationIn this blog post we take a practical spin at container security and look at SLSA buid attestations, SBOM, and Binary Authorization in GCP.Nov 2, 2023Nov 2, 2023
TahirWhy Every Modern Software Needs a Software Bill of Materials (SBOM) for SecurityLearn about the types of Software Bill of Materials (SBOM) — Design, Source, Build, Analyzed, Deployed, and Runtime — and how each…Oct 30
InNerd For TechbyTaylor ArmerdingReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
Ata SerenCreating a DevSecOps pipeline with Jenkins — Part 2This is the part 2 of my journey in creating a robust DevSecOps pipeline by using Jenkins and various tools.Jul 42
Dana CraneRegulatory Compliance & Open Source SoftwareOpen Source Software (OSS) forms the majority of the codebase in any modern software application, but it’s rarely built for a specific…Oct 25
InGoogle Cloud - CommunitybyDaniel StrebelKYC - Know your Container(image) with SLSA, SBOM and Binary AuthorizationIn this blog post we take a practical spin at container security and look at SLSA buid attestations, SBOM, and Binary Authorization in GCP.Nov 2, 2023
Can ÖzkanHow to Generate SBOM for C# DotNetProjectsIn the dynamic realm of DotNet development, where libraries and dependencies are rather complex, the need for transparency and security has…Mar 16