InPalantir BlogbyPalantirHow Palantir Integrates Threat Modeling Into Product Development (Software Supply Chain Series, #2)Editor’s Note: This is the second post in a series that shares insights from our journey to enhance our software supply chain security…2d ago
InNerd For TechbyTaylor ArmerdingReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
InPalantir BlogbyPalantirHow Palantir Enables a Secure, Rapid Software Development Environment(Software Supply Chain Security, #1)Nov 121Nov 121
John Farrier12 Ways C++ Developers Increase Cyber Attack Vulnerabilities and How to Prevent ThemSoftware development requires a careful balance between functionality, performance, and security. C++ developers, with the language’s…4d ago4d ago
Jean-Philippe GouinHow to create a multi clusters secure supply chain (SLSA 3) in 10min (OSS edition)TL:DR : https://github.com/jp-gouin/multi-cluster-supply-chainMar 15Mar 15
InPalantir BlogbyPalantirHow Palantir Integrates Threat Modeling Into Product Development (Software Supply Chain Series, #2)Editor’s Note: This is the second post in a series that shares insights from our journey to enhance our software supply chain security…2d ago
InNerd For TechbyTaylor ArmerdingReminder: A weak link in your software supply chain makes the whole chain weakA single vulnerability in your software supply chain can allow an attacker into your whole operation.Feb 121
InPalantir BlogbyPalantirHow Palantir Enables a Secure, Rapid Software Development Environment(Software Supply Chain Security, #1)Nov 121
John Farrier12 Ways C++ Developers Increase Cyber Attack Vulnerabilities and How to Prevent ThemSoftware development requires a careful balance between functionality, performance, and security. C++ developers, with the language’s…4d ago
Jean-Philippe GouinHow to create a multi clusters secure supply chain (SLSA 3) in 10min (OSS edition)TL:DR : https://github.com/jp-gouin/multi-cluster-supply-chainMar 15
InNerd For TechbyTaylor ArmerdingThese software packages contain “presents” you don’t want to openMalicious hackers, instead of waiting for software developers to make mistakes, are trying to trick them into downloading mistakes.Dec 2
Amin SofttechHow DevSecOps Can Support Your Software Supply ChainPreserving the software supply chain in the contemporary digital era is imperative. As cyber dangers increase, businesses must guarantee…Aug 20
Ekene EjikeStreamlining dependency management with Google artifact registry.Efficient dependency management is a cornerstone of modern software development.Nov 20