Security

Reflections on Visiting it-sa Expo&Congress

Reflections on Visiting it-sa Expo&Congress

As the threats to Information security multiply and evolve each year, our colleague Kosae wasn’t at all surprised to witness the rapid growth of the cybersecurity market at the recent it-sa. In an era where cyber attacks become more sophisticated and frequent, it’s clear that organizations are increasingly prioritizing security measures. This annual gathering showcased some of the latest advancements, strategies, and insights within the field.

Scanning a microservice architecture with Veracode Collections

Scanning a microservice architecture with Veracode Collections

Facing the escalating number of reported Common Vulnerabilities and Exposures (CVEs), Veracode offers a solution providing comprehensive tools for detection and remediation of security vulnerabilities. The article further delves into how Veracode Collections contributes to overcoming limitations in traditional scanning approaches, allowing a more efficient and customized security review of complex microservice architectures.

Open Source Tools for Software Supply Chain Security

Open Source Tools for Software Supply Chain Security

In this article we show how you can improve the security of your software supply chain without spending money for software licenses. For this, we present useful open-source tools for automated dependency updates, vulnerability scanning of dependencies, license scanning, SBOM generation, secret detection and scanning of infrastructure as code for vulnerabilities and misconfiguration.

Software Supply Chain Security with Google Software Delivery Shield

Software Supply Chain Security with Google Software Delivery Shield

Our authors Pascal and Bastian investigated the Google Software Delivery Shield which is Google’s fully managed solution for software supply chain security. In this article they describe how software supply chain security can be achieved during the different steps of the software development lifecycle with the Google Software Delivery Shield.

Introduction to Software Supply Chain Security

Introduction to Software Supply Chain Security

Our author Daniel gives an introduction into Software Supply Chain Security in software development processes and highlights its importance. The article stresses how neglecting security in the software development process can lead to successful attacks, compromising users‘ data and systems. It also provides tips on achieving Software Supply Chain Security, including scanning for vulnerabilities, updating dependencies, and secret detection.