Tag: Anchore
-
Anchore: The NVD Enrichment Crisis: One Year Later—How Anchore is Filling the Vulnerability Data Gap
Source URL: https://anchore.com/blog/nvd-crisis-one-year-later/ Source: Anchore Title: The NVD Enrichment Crisis: One Year Later—How Anchore is Filling the Vulnerability Data Gap Feedly Summary: About one year ago, Anchore’s own Josh Bressers broke the story that NVD (National Vulnerability Database) was not keeping up with its vulnerability enrichment. This week, we sat down with Josh to see…
-
Anchore: Automate Your Compliance: How Anchore Enforce Secures the Software Supply Chain
Source URL: https://anchore.com/blog/automate-your-compliance-how-anchore-enforce-secures-the-software-supply-chain/ Source: Anchore Title: Automate Your Compliance: How Anchore Enforce Secures the Software Supply Chain Feedly Summary: In an era where a single line of compromised code can bring entire enterprise systems to their knees, software supply chain security has transformed from an afterthought to a mission-critical priority. The urgency is undeniable: while…
-
Anchore: The Critical Role of SBOMs in PCI DSS 4.0 Compliance
Source URL: https://anchore.com/blog/pci-dss-4-compliance-with-sboms-and-software-supply-chain-security/ Source: Anchore Title: The Critical Role of SBOMs in PCI DSS 4.0 Compliance Feedly Summary: Is your organization’s PCI compliance coming up for renewal in 2025? Or are you looking to achieve PCI compliance for the first time? Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) became mandatory…
-
Anchore: Generating SBOMs for JavaScript Projects: A Developer’s Guide
Source URL: https://anchore.com/blog/javascript-sbom-generation/ Source: Anchore Title: Generating SBOMs for JavaScript Projects: A Developer’s Guide Feedly Summary: Let’s be honest: modern JavaScript projects can feel like a tangled web of packages. Knowing exactly what’s in your final build is crucial, especially with rising security concerns. That’s where a Software Bill of Materials (SBOM) comes in handy…
-
Anchore: The Developer’s Guide to SBOMs & Policy-as-Code
Source URL: https://anchore.com/blog/sbom-and-policy-as-code-a-developers-guide/ Source: Anchore Title: The Developer’s Guide to SBOMs & Policy-as-Code Feedly Summary: If you’re a developer, this vignette may strike a chord: You’re deep in the flow, making great progress on your latest feature, when someone from the security team sends you an urgent message. A vulnerability has been discovered in one…
-
Anchore: Software Supply Chain Transparency: Why SBOMs Are the Missing Piece in Your ConMon Strategy
Source URL: https://anchore.com/blog/sboms-and-conmon-strengthen-software-supply-chain-security/ Source: Anchore Title: Software Supply Chain Transparency: Why SBOMs Are the Missing Piece in Your ConMon Strategy Feedly Summary: Two cybersecurity buzzwords are rapidly shaping how organizations manage risk and streamline operations: Continuous Monitoring (ConMon) and Software Bill of Materials (SBOMs). ConMon, rooted in the traditional security principle—“trust but verify”—has evolved into…
-
Anchore: Rapid Incident Response to Zero-Day Vulnerabilities with SBOMs
Source URL: https://anchore.com/videos/rapid-incident-response-to-zero-day-vulnerabilities-with-sboms/ Source: Anchore Title: Rapid Incident Response to Zero-Day Vulnerabilities with SBOMs Feedly Summary: The post Rapid Incident Response to Zero-Day Vulnerabilities with SBOMs appeared first on Anchore. AI Summary and Description: Yes Summary: The text discusses the importance of Software Bill of Materials (SBOMs) in enhancing security protocols during software supply chain…
-
Anchore: How to Automate Container Vulnerability Scanning for Harbor Registry with Anchore Enterprise
Source URL: https://anchore.com/blog/how-to-automate-container-vulnerability-scanning-for-harbor-registry-with-anchore-enterprise/ Source: Anchore Title: How to Automate Container Vulnerability Scanning for Harbor Registry with Anchore Enterprise Feedly Summary: Security engineers at modern enterprises face an unprecedented challenge: managing software supply chain risk without impeding development velocity, all while threat actors exploit the rapidly expanding attack surface. With over 25,000 new vulnerabilities in 2023…