Implementing SLSA Source Requirements to Improve Software Supply Chain Security
SLSA source requirements help mitigate threats originating from source control management.
Schedule a 30-minute live product demo with expert Q&A
SLSA source requirements help mitigate threats originating from source control management.
JFrog and Cycode created an integration that will improve the security of our customers’ digital assets and dependencies.
In light of recent, multi-billion dollar cyber attacks, Google has introduced a framework to help developers improve software supply chain security. This proposed solution is…
There’s little doubt that 2021 has been the year of the software supply chain attack, with many notable breaches that include Solarwinds…
Infrastructure as Code (IaC) is a rapidly growing technique of provisioning infrastructure with software, utilizing software…
Compromised credentials are a tried-and-true tactic for hackers looking to gain access to secured systems, including personal accounts, corporate networks, SaaS applications and even development environments.
The Codecov breach is an example of a classic software supply chain attack, in which attackers gain organization access by compromising 3rd…
Several forms of supply chain attack have recently emerged that allow for attackers to insert themselves between developers and the dependencies they utilize.
Branch protection rules are a crucial part of securing source control management systems. Branch protection rules enable administrators…
On April 15th, Codecov disclosed a major breach when an attacker compromised its infrastructure allowing to export sensitive information like…