Tag: software supply chain

  • The Register: Socket plugs in $40M to strengthen software supply chain

    Source URL: https://www.theregister.com/2024/10/22/socket_slurps_40m_to_secure/ Source: The Register Title: Socket plugs in $40M to strengthen software supply chain Feedly Summary: Biz aims to scrub unnecessary dependencies from npm packages in the name of security Security-focused developer Socket announced on Tuesday it has connected with another $40 million in funding to further its efforts to safeguard the software…

  • Anchore: Introducing Anchore Data Service and Anchore Enterprise 5.10

    Source URL: https://anchore.com/blog/anchore-enterprise-fall-product-update-2024/ Source: Anchore Title: Introducing Anchore Data Service and Anchore Enterprise 5.10 Feedly Summary: We are thrilled to announce the release of Anchore Enterprise 5.10, our tenth release of 2024. This update brings two major enhancements that will elevate your experience and bolster your security posture: the new Anchore Data Service (ADS) and…

  • Alerts: Guidance: Framing Software Component Transparency: Establishing a Common Software Bill of Materials (SBOM)

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/15/guidance-framing-software-component-transparency-establishing-common-software-bill-materials-sbom Source: Alerts Title: Guidance: Framing Software Component Transparency: Establishing a Common Software Bill of Materials (SBOM) Feedly Summary: Today, CISA published the Framing Software Component Transparency, created by the Software Bill of Materials (SBOM) Tooling & Implementation Working Group, one of the five SBOM community-driven workstreams facilitated by CISA. CISA’s community-driven working groups publish…

  • Hacker News: Avoiding a Geopolitical open-source Apocalypse

    Source URL: https://thenewstack.io/avoiding-a-geopolitical-open-source-apocalypse/ Source: Hacker News Title: Avoiding a Geopolitical open-source Apocalypse Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses the growing divide in open source development, particularly between Chinese and Western developers, and explores the implications for security and trust in open source software. It addresses concerns about the geopolitical…

  • Cloud Blog: How Google Cloud supports telecom security and compliance

    Source URL: https://cloud.google.com/blog/products/identity-security/how-google-cloud-supports-telecom-regulatory-compliance/ Source: Cloud Blog Title: How Google Cloud supports telecom security and compliance Feedly Summary: Operating a telecommunications network is more than just connecting phone calls, or helping people share funny videos online. Telecom networks are critical components of our society’s infrastructure. Telecom operators face a wide array of risks to the critical…

  • Cloud Blog: Introducing AI-powered app dev with code customization from Gemini Code Assist Enterprise

    Source URL: https://cloud.google.com/blog/products/application-development/introducing-gemini-code-assist-enterprise/ Source: Cloud Blog Title: Introducing AI-powered app dev with code customization from Gemini Code Assist Enterprise Feedly Summary: Software development is the engine of the modern economy. However, creating great applications across the tech stack is complex because of an increasing number of abstraction levels, integrations, vendors, and a dearth of experienced…

  • Cloud Blog: You can now sign Microsoft Windows artifacts with keys protected by Cloud HSM

    Source URL: https://cloud.google.com/blog/products/identity-security/you-can-now-sign-microsoft-windows-artifacts-with-keys-protected-by-cloud-hsm/ Source: Cloud Blog Title: You can now sign Microsoft Windows artifacts with keys protected by Cloud HSM Feedly Summary: To build trust in the software world, developers need to be able to digitally sign their code and attest that the software their customers are downloading is legitimate and hasn’t been maliciously altered.…

  • Anchore: How to build an OSS vulnerability management program

    Source URL: https://anchore.com/blog/build-open-source-software-security-program-with-sbom-generation-and-vulnerability-scanning/ Source: Anchore Title: How to build an OSS vulnerability management program Feedly Summary: In previous blog posts we have covered the risks of open source software (OSS) and security best practices to manage that risk. From there we zoomed in on the benefits of tightly coupling two of those best practices (SBOMs…

  • Slashdot: GitHub Actions Typosquatting: a High-Impact Supply Chain Attack-in-Waiting?

    Source URL: https://developers.slashdot.org/story/24/09/07/0427219/github-actions-typosquatting-a-high-impact-supply-chain-attack-in-waiting?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: GitHub Actions Typosquatting: a High-Impact Supply Chain Attack-in-Waiting? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the vulnerabilities intrinsic to the GitHub Actions ecosystem, particularly focusing on the threat of typosquatting. It highlights how this form of attack can lead to significant risks in software supply…

  • Anchore: How is Open Source Software Security Managed in the Software Supply Chain?

    Source URL: https://anchore.com/blog/open-source-software-security-in-software-supply-chain/ Source: Anchore Title: How is Open Source Software Security Managed in the Software Supply Chain? Feedly Summary: Open source software has revolutionized the way developers build applications, offering a treasure trove of pre-built software “legos” that dramatically boost productivity and accelerate innovation. By leveraging the collective expertise of a global community, developers…