Security

CVE Management: More efficient with the right tooling

CVE Management: More efficient with the right tooling

In today’s interconnected and rapidly evolving software landscape, vulnerabilities are an unavoidable part of development. As the complexity of applications grows, so does the attack surface. With dependencies on numerous external libraries, open-source packages, and container images, transitive CVEs become one of the most common vulnerability findings and worth focusing at. This blog post will introduce you the the world of CVE Management and give you an overview of some common tools you might use.

Quantum Computing and the Future of Cryptography – an Overview

Quantum Computing and the Future of Cryptography – an Overview

Quantum computing is a rapidly advancing research area which promises to solve various classically difficult problems, including various cryptographic schemes. Several experts predict that quantum computers will be capable of breaking currently used encryption schemes in a decade. To secure data in the post-quantum future the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has announced the first completed standards for post-quantum cryptography protocols.
This article provides an introduction to quantum computers as well as an overview of post-quantum cryptography.

Reflections on Visiting it-sa Expo&Congress

Reflections on Visiting it-sa Expo&Congress

As the threats to Information security multiply and evolve each year, our colleague Kosae wasn’t at all surprised to witness the rapid growth of the cybersecurity market at the recent it-sa. In an era where cyber attacks become more sophisticated and frequent, it’s clear that organizations are increasingly prioritizing security measures. This annual gathering showcased some of the latest advancements, strategies, and insights within the field.

Scanning a microservice architecture with Veracode Collections

Scanning a microservice architecture with Veracode Collections

Facing the escalating number of reported Common Vulnerabilities and Exposures (CVEs), Veracode offers a solution providing comprehensive tools for detection and remediation of security vulnerabilities. The article further delves into how Veracode Collections contributes to overcoming limitations in traditional scanning approaches, allowing a more efficient and customized security review of complex microservice architectures.

Open Source Tools for Software Supply Chain Security

Open Source Tools for Software Supply Chain Security

In this article we show how you can improve the security of your software supply chain without spending money for software licenses. For this, we present useful open-source tools for automated dependency updates, vulnerability scanning of dependencies, license scanning, SBOM generation, secret detection and scanning of infrastructure as code for vulnerabilities and misconfiguration.