Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2022

Rezilion Announces Integration With GitLab That Helps Organizations Reduce Vulnerability Backlog by 70%

Rezilion announced today an integration with GitLab, the DevOps Platform, that enhances developers' ability to release secure software products faster. Deployed in minutes, this native integration with GitLab CI eliminates an organization's vulnerability backlog by 70% and reduces remediation from months to days while addressing 100% of exploitable risk.

Rezilion Partners With Gitlab to Resolve DevSecOps Tension

In a key step to resolve the longstanding tension between developers and security teams, Rezilion and GitLab are partnering on an important integration to address those needs. This integration helps developers detect and remediate vulnerabilities early on in the development without adding extra work and steps and release products quickly and securely. Deployed in minutes, Rezilion’s DevSecOps platform is now natively integrated with GitLab CI.

Log4j Webinar Recap: What Your Scanner is Missing

Log4j continues to be a thorn in the side of security leaders, who have spent the last several months battling the recently discovered flaw in Apache’s Log4j software. In a recent webinar, Yotam Perkal, director of vulnerability research at Rezilion, said the implications of the bug are far-reaching and will likely be exploited for years to come. Apache Log4j is an open source Java logging library used in millions of Java applications worldwide.

Dynamic SBOM: A Comprehensive Guide

A Software Bill of Materials (SBOM) is a list of ingredients that make up software components. This includes code updates, vulnerability patches, new features, and any other modifications. An SBOM is useful in tracking the history of software products and their components. But SBOMs are static, and frequently changes need to be made, which can be labor intensive and costly for organizations.

Shore Up Defenses Now to Guard Against Attacks Amid Russia-Ukraine Conflict

The recent invasion of Russian troops into Ukraine territory was preceded by a blitz of cyberattacks targeting banking systems, government websites, and critical infrastructure. The cyberattacks started long before Russian troops began to descend on Ukraine borders. Cyberattacks date back to 2015 when the Russian intelligence organization, the GRU, targeted Ukraine’s industrial control systems networks with malware.