Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Identifying and Avoiding Malicious Packages

Securing your software supply chain is absolutely critical as attackers are getting more sophisticated in their ability to infect software at all stages of the development lifecycle. This webinar will be a technical showcase of the different types of malicious packages that are prevalent today in the PyPI (Python) and npm (Node.js) package repositories. All examples shown in the webinar will be based on real data and malicious packages that were identified and disclosed by the JFrog security research team.

Top 10 CI/CD Automation Tools

Software teams have focused on agility since the world embraced Mark Zuckerberg’s motto to “move fast and break things.” But many still lack the confidence or tooling to accelerate their processes. What’s more: in the race to release more, ship faster, and prioritize speed, many have neglected thoughtfulness and security – with Facebook itself becoming the poster child of data misuse.

User Office Hours: Building secure application in VS Code with Snyk

Visual Studio Code (VS Code) is a code editor redefined and optimized for building and debugging modern web and cloud applications. The Snyk integration for VS Code can help you create secure applications from the beginning. Join us to learn more about Snyk VS Code capabilities. During this session, we’ll take a look at: Throughout the session you can ask us anything! Bring all of your Snyk questions and we’ll do our very best to answer them.

How Hardening is reflected in the different NIST Standards

NIST stands for National Institute of Standards and Technology. NIST was founded in 1901 and is a part of the U.S Department of Commerce. It is one of the oldest physical science laboratories in the US and was formed to remove challenges related to industrial competitiveness.

NIST Cyber Security Framework - 5 Core Functions Infographic

Some standards, guidelines, and best practices to meet the industrial, public, and federal agencies’ needs in Cybersecurity are developed by NIST. The cybersecurity framework by NIST has an outcome-based approach and this set it to be applied in any sector and on any size of business. There are three basic pillars of the NIST cybersecurity framework, namely; The framework core has five major functions.

From WhiteSource to Mend-A Rebrand Journey

How important is a company name, really? Turns out that it is pretty important, especially if the name you currently have does not represent what the company has become, or where it is going. Our name is what defines the vision, spirit, and ethos of who we are and what we are trying to accomplish—the strategy, technology, and culture all rolled into one. It needs to be crisp, memorable, and legally acquirable. Guess what? It is harder than it looks…