all InfoSec news
The essential duo of SCA and SBOM management
April 12, 2024, 6:44 p.m. | alinskens@sonatype.com (Aaron Linskens)
Sonatype Blog blog.sonatype.com
In the modern shifting landscape of software supply chain attacks, prioritizing application security and integrity is non-negotiable.
application application security attacks duo integrity management non sbom sbom management sbom manager sca security software software bill of materials software composition analysis software supply chain software supply chain attacks supply supply chain supply chain attacks
More from blog.sonatype.com / Sonatype Blog
I have an SBOM, now what?
3 days, 8 hours ago |
blog.sonatype.com
PyPI crypto-stealer targets Windows users, revives malware campaign
3 days, 17 hours ago |
blog.sonatype.com
Zero-day vulnerabilities: A beginner's guide
1 week, 3 days ago |
blog.sonatype.com
Sonatype Lifecycle best practices: InnerSource
2 weeks, 3 days ago |
blog.sonatype.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC