Understanding the Trojan Source Attack and How to Defend Against It
There’s little doubt that 2021 has been the year of the software supply chain attack, with many notable breaches that include Solarwinds…
There’s little doubt that 2021 has been the year of the software supply chain attack, with many notable breaches that include Solarwinds…
Terraform, developed by Hashicorp, is an infrastructure as code (IaC) framework that allows for declarative resource provisioning…
Infrastructure as Code (IaC) is a rapidly growing technique of provisioning infrastructure with software, utilizing software…
Compromised credentials are a tried-and-true tactic for hackers looking to gain access to secured systems, including personal accounts, corporate networks, SaaS applications and even development environments.
DevOps has been around for more than a decade…
Branch protection rules are a crucial part of securing source control management systems. Branch protection rules enable administrators…
As part of our research of the GitHub Actions security landscape, we discovered that in writing a perfectly secure GitHub Actions workflow, several pitfalls could cause severe security consequences…
The last decade of application development experienced a staggering amount of innovation. Technologies like containers, Kubernetes…
The SolarWinds breach underscores the importance of verifying the integrity of each phase of the development to prevent code…