Introducing New Secrets Management Capabilities For Mitigating Software Supply Chain Risk

Introducing New Secrets Management Capabilities For Mitigating Software Supply Chain Risk

Businesses are vulnerable to software supply chain breaches when software releases leak secrets such as authentication credentials, hardcoded passwords, API tokens, and encryption keys. Look no further than the CircleCI, Toyota and CodeCov incidents ... Read More
Not all SBOMs Are the Same. Choose Wisely!

Not all SBOMs Are the Same. Choose Wisely!

| | Blog
Software Bills of Materials (SBOMs) are top of mind for most organizations, with 78% of them expecting to produce or consume SBOMs[1]. This is not surprising as the visibility provided by comprehensive SBOM makes it easier to answer the questions such as: “What’s the minimum number of libraries we must ... Read More
Expanding Security Visibility To Reduce Software Supply Chain Risk

Expanding Security Visibility To Reduce Software Supply Chain Risk

No doubt about it, the way malicious actors attack their targets through software is changing.The attack pattern we’re familiar with is fairly direct. Someone finds a vulnerability in deployed software. Malicious actors develop malware to exploit the weakness. They then find a way to reach the deployed software within target ... Read More
3 Reasons for Appsec Folks to be Excited About ReversingLabs

3 Reasons for Appsec Folks to be Excited About ReversingLabs

While attacks on software supply chains aren’t new, the intense focus of malicious actors on tampering with trusted applications demands an extension of existing application security programs to identify and address a growing set of indicators of compromise. Minimizing the risk of future supply chain attacks requires us to improve ... Read More