Explore >> Select a destination


You are here

www.legitsecurity.com
| | cd.foundation
2.0 parsecs away

Travel
| | Four new features for supply chain security in Tekton: - Robust provenance - Sigstore integration - Trusted resources - Tekton Catalog now available on Artifact Hub
| | www.synopsys.com
2.3 parsecs away

Travel
| | Estimated Read Time: 5 mins - Understand the importance of a Software Bill of Materials (SBOM) and how it helps manage security, license, and operational risks in open source usage.
| | www.rezilion.com
1.6 parsecs away

Travel
| | This blog post explores the ways in which Application Security Posture Management tools (ASPM) can Help with Software Supply Chain Security.
| | www.sonatype.com
10.0 parsecs away

Travel
| Learn about a new, targeted backdoor supply chain attack against the popular XZ compression utility seen in many Linux distributions such as fedora and debian. Understand its impact, potential risks and what you can do about it.