Enhancing software supply chain security: New Sonatype product capabilities

Enhancing software supply chain security: New Sonatype product capabilities

We are thrilled to announce the latest enhancements for Sonatype Repository Firewall, Sonatype Nexus Repository, and Sonatype Lifecycle. The enhanced capabilities empower organizations to exert more control over their software development life ...
Getting started with the Secure Software Development Framework (SSDF)

Getting started with the Secure Software Development Framework (SSDF)

In today’s software-driven world, it’s crucial to ensure the security of software during development. Yet many software development life cycle (SDLC) models lack specific emphasis on software security, requiring the addition of ...
Cyber Resilience Act: The Future of Software in the European Union

Cyber Resilience Act: The Future of Software in the European Union

Representatives of member states of the European Union (EU) reached a common agreement yesterday regarding the proposed Cyber Resilience Act (CRA) ...
How to Measure the Maturity of Your Software Supply Chain

How to Measure the Maturity of Your Software Supply Chain

In today's fast-paced software development landscape, organizations face rising challenges to ensure the security, quality, and reliability of the software they deliver. Your software supply chain plays a pivotal role in meeting these ...
Sonatype Named in the 2023 Gartner® Magic Quadrant™ for Application Security Testing

Sonatype Named in the 2023 Gartner® Magic Quadrant™ for Application Security Testing

  We’re thrilled to announce that Sonatype has been named in the 2023 Gartner Magic Quadrant for Application Security Testing (AST). Gartner has identified software composition analysis (SCA) and software supply chain ...
Protecting Software Developers from Malware with AI/ML Insights

Protecting Software Developers from Malware with AI/ML Insights

In my last post I talked about solutions to address malware and the increase in attacks. Today I’ll dig into what’s necessary to find and avoid malware ...