Securing Artifacts: Keyless Signing with Sigstore and CI/MON

Artifact integrity is crucial in maintaining software security and trustworthiness. High-profile breaches like SolarWinds, CodeCov, 3CX, and JumpCloud have shown how altering artifact contents can lead to significant security vulnerabilities, enabling attackers to infiltrate and compromise software supply chains. This is the first in a series of blog posts about the importance of artifact integrity, … Read more

Non-Human Identity Management: A Guide

Advancements in AI, IoT, cloud services, and microservices architecture have fundamentally altered how we approach identity management and necessitated the creation and management of service accounts, APIs, and application accounts. That’s where non-human identities (NHIs) come in.  While NHIs enhance automation, scalability, and efficiency, they also introduce new security challenges that must be addressed to … Read more