You are here |
github.blog | ||
| | | |
www.sonatype.com
|
|
| | | | The SolarWinds software supply chain attack has made it clear that open source developers need to act now and intelligently manage third party dependencies to. | |
| | | |
adnanthekhan.com
|
|
| | | | Web3 has a weakness, and that is CI/CD security. Learn how I responsibly disclosed a Critical vulnerability in Astar Network's GitHub repository that would have allowed attackers to conduct a serious attack on the network, and how their security team handled it. | |
| | | |
snyk.io
|
|
| | | | A look back at the chain of events that led to the use of the malicious npm package "flatmap-stream" and a reflection on what it means for the fragility of open source. | |
| | | |
www.sentra.io
|
|
| | Discover how Data Security Posture Management (DSPM) allows access control policy to travel with the data throughout the public cloud. |