A comprehensive list of components in a software product.
Read moreTypo-based attack targeting mistyped package names to spread malware.
Manipulating people into revealing confidential info or performing unsafe actions.
A comprehensive list of components in a software product.
SBOMs relation to healthcare and medical devices.
Assessing third-party components for security risks.
Identifying and mitigating risks in the software supply chain.
Learn the basics about software supply chain security.
Reviewing code without executing it to find vulnerabilities.
An attack targeting vulnerabilities in the supply chain.
Collecting data from systems for analysis and monitoring.
Gathering and analyzing information on cyber threats.
Identifying and evaluating potential security threats.
Replacing sensitive data with non-sensitive substitutes.
Indirect third-party components that your application inherits through its direct dependencies.
Registering mistyped domain/package names to trick users into installing malicious content.
A security model ensuring trust across systems and networks.
Processes for timely deployment of software updates.
Analyzing user actions to detect anomalies and threats.
A format for sharing whether a vulnerability affects specific software components.
Confirming that systems meet specified security standards.
Protecting the integrity of source code repositories.
A vulnerability in your external software supply chain exposes your dependencies to supply chain attacks.
Automated scanning for known security weaknesses.
Securing automated communication endpoints between applications.
Securing business processes and automated workflows.
Digital certificates that use the X.509 standard for authentication.
Protecting XML data and processes from exploitation.
A lossless data compression utility; linked to a major supply chain backdoor incident.
Securing configuration files written in YAML format.
Rules used to identify and classify malware.
A security framework that assumes no implicit trust.
Processes to detect and mitigate previously unknown vulnerabilities.