Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SBOM

How SBOMs and The Digital Supply Chain Converge

Software development is not slowing down and neither are the demands for new features. In order to keep up with the needs of the market and tight deadlines, software engineers have become adept at leveraging the massive ecosystem of 3rd party libraries available in source code management repositories such as GitHub. After all, why build something yourself and waste precious time when you can use what someone else has already created?.

Build Audit Trails With Dropbox and DataTrails

DataTrails enables compliance and audit teams to eliminate the time-wasting and error-prone processes with our new solution. With the introduction of our Dropbox connector, there is a no-code solution that provides notarized evidence of your file’s metadata. Now you can capture legally admissible proof for your business with just a few clicks. To get started, set-up a free DataTrails account and connect it to Dropbox by following these instructions.

RKVST is now DataTrails! #shorts

We've listened, we've learned, and the market has definitely spoken! Our old name just wasn't working: it was hard to pronounce, hard to spell, and hard to understand what we do. Even if the ‘archivist' leap was made it didn't carry our special mission with it. At the same time, our customers are increasingly telling us that what we do best is help them build immutable audit trails for all their business data: documents, files, images and other types of digital content.

Postman Configuration for DataTrails

One of my favourite tools for playing with REST APIs is, of course, Postman. It can make interacting with DataTrails super quick and easy, and help you develop custom workflows for storing and validating your digital provenance and audit trails. Here’s a step-by-step guide to getting a robust Postman set-up configured, and if you head over the Postman public collections you’ll find a link to a pre-baked DataTrails Postman collection with this done for you, along with some example requests.

Secure your software supply chain with the new Snyk Vulnerability Intelligence for SBOM ServiceNow integration

Whether internally developed or purchased, your applications can be exposed to a host of vulnerabilities, especially via open source components that are widely used in today’s software. A recent survey found that 60% of data breach victims were compromised due to a known but unpatched vulnerability. Effective prevention and risk management requires being able to understand the vulnerability risk profile for each component of your Software Supply Chain.

Navigating SBOM: What Are The Implications for Device Manufacturers and Healthcare Providers

In an increasingly interconnected world, the Internet of Things (IoT) has become a significant driver of innovation across various industries. Healthcare institutions were early adopters of IoT technology, leveraging it to improve patient care, streamline operations, and enhance data management. However, this surge in IoT adoption brings with it new challenges, one of which is the need for more transparency and security in the supply chain of connected medical devices.

RKVST for Dropbox - bring provenance to your Dropbox files

Bring provenance to your Dropbox files with RKVST. How can you prove that your work is original, authentic, and trustworthy? How can you protect it from being copied, manipulated, or misused? That’s where RKVST comes in, documenting the origin, history, and validity of your content, such as text, images, audio, or video, so you can prove where it came from. With RKVST you can: And with RKVST for Dropbox creating and recording the provenance metadata is as easy as a click of a button. Watch our video to find out how.

Navigating the Supply Chain Security Maze with SBOMs

Security Magazine reported more than 2,200 daily cyberattacks, which translates to roughly one cyberattack occurring every 39 seconds! As these stakes in cybersecurity continue to reach higher and higher levels, it becomes even more crucial to emphasize securing the very bedrock of elements upon which our digital existence is built.