Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Supply Chain

What is JFrog Security?

The security of the software supply chain is rapidly becoming a paramount concern for organizations — and for good reason. With the increasing number of published Common Vulnerabilities and Exposures (CVEs), developers face the challenge of delivering software faster than ever before. However, in their quest for speed, many dev and security teams have resorted to fragmented security solutions, inadvertently leaving critical gaps in coverage and compromising their competitive advantage.

Kroger's approach to supply chain security

Recently, Snyk hosted a wine tasting & customer discussion featuring David Imhoff, Product Security Leader at Kroger. The discussion focused on tackling the challenges of securing digital supply chains. Kroger is a retail giant with 2,700 stores and 400,000 employees. The organization faces unique challenges because it operates on such a massive scale, adding complexity to its software supply chain and security.

Featured Post

Egress experts share predictions for cybersecurity in 2024

2023 has been a ground-breaking year for cybersecurity advancements and attacks, with new developments making headlines globally. Experts from threat intelligence, product management, and customer services at Egress share their predictions for what's to come in 2024 in this dynamic landscape.

Protecting your SDLC from a supply chain attack

Did you know that nine out of 10 companies detected software supply chain risks in the past 12 months? The increase in the number of dependencies in a supply chain has extended the attack surface for adversaries. It has also caused threat actors to shift their focus from the downstream chain affecting just end users to the upstream chain affecting vendors, customers, and end users alike.

Regulatory Compliance in Aviation Procurement: Navigating the Complex Landscape

In the vast airspace of the aviation industry, procurement is a complex journey laden with many regulatory checkpoints. It's a unique dance between sticking to global standards and being in the pursuit of operational efficiency. This sector is often considered the lifeline of global connectivity. So, it still remains one of the most strictly monitored sectors. It's because when it comes to aviation, it's not about ticking boxes for the sake of it. The lives of millions of passengers depend on the regulations daily.

The 443 Podcast - Episode 273 - Hacking the Crypto Supply Chain

This week on the podcast, we cover a supply chain attack against one of the largest hardware cryptocurrency wallet manufacturers. After that, we discuss the latest Apache Struts vulnerability under active exploit by threat actors. We end the episode with our thoughts on a research blog post about a set of threat actors using an old school attack against modern targets. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Securing Your Supply Chain: Risk Management vs Security Management

Supply chain management has become a top priority for businesses due to the increasing use of digital technologies and geopolitical uncertainties, making global supply chains more vulnerable than ever to disruptions. This reality highlights two critical aspects of supply chain management: Supply Chain Risk Management (SCRM) and Supply Chain Security Management (SCSM).

What Is Software Supply Chain Security? Comprehensive Guide

Software supply chain security is on the highest priorities list of an organization. It consists of every major and minor stakeholder, tool, application, and resource associated with a software development project. However, some organizations still need clarification about it or need to know how exactly they can maintain it and prevent attackers from exploiting the supply chain. But now, with this blog, everything will be cleared within minutes.

Six More Top Tips For Holistic AppSec and Software Supply Chain Security

In my previous post, I began to list the ways you can strengthen your security posture, with some holistic approaches to application security and the software supply chain. In this second part of the series, let’s look at six more important considerations.

Ekran System's Cyber Essentials Certification: Enhanced Software & Supply Chain Security

At Ekran System, we take our security and the protection of our partners and customers seriously. Our commitment to delivering the best insider risk management services motivated us to align our own security posture to the current Cyber Essentials standards. We are proud to announce that we have obtained the certification!