General

Your Application Development Organization Inadvertently Leaves Door Open for Hackers

“Most if not all of the hacker attacks on well-known companies in recent years didn’t come about because of weak perimeter defense. Indeed, perimeter defense has proven to be remarkably good. But nowadays, most attacks happen because of big gaps in the security of the development supply chain. In other words, vulnerabilities and malware enter …

Your Application Development Organization Inadvertently Leaves Door Open for Hackers Read More »

Introducing the Developer’s Guide to SBOMs

As a concept, the Software Bill of Materials (SBOM) isn’t particularly complex: it’s a manifest that identifies the components that make up a particular software artifact. When we start looking at the practical implementation of SBOMs, however, a lot of complexity is suddenly introduced into the equation. You might be wondering what actually goes into …

Introducing the Developer’s Guide to SBOMs Read More »

A Jenkins shared library to execute commands with vcn, our CLI tool

Learn how to reuse code in continuous integration pipelines with our digital assets attestation tool If you need to use the same piece of code in many different pipelines, a Jenkins shared library is a good approach. After importing it, you will have access to its methods, which is a convenient way of avoiding repetition …

A Jenkins shared library to execute commands with vcn, our CLI tool Read More »

Metrics & Logs support for IoT – Bringing Secure Monitoring and Logging to the Edge

Simple uptime monitoring for Internet-of-Things (IoT) is well-known and requires knowing if the devices are up and running. Having additional long-term performance data, secure (tamper-proof) logging at your Edge devices is only a tiny step when using Metrics & Logs. With our support for device, infrastructure, and application metrics as well as Syslog data, you …

Metrics & Logs support for IoT – Bringing Secure Monitoring and Logging to the Edge Read More »

A GitHub Action to download and use our enterprise tool vcn in CI

Recently, we at Codenotary released a new version of a GitHub Action that can be used to download our enterprise CLI tool vcn and execute commands with it. Available on GitHub’s marketplace, it can be implemented by our customers in GitHub Action continuous integration pipelines to notarize and authenticate digital assets as part of an …

A GitHub Action to download and use our enterprise tool vcn in CI Read More »

Serious security vulnerabilities in Atlassian Confluence affect many organizations

Last weekend was all about releasing fixes for a major (critical) Confluence server vulnerability, tracked by CVE-2022-26134, that allows an unauthenticated attacker to execute arbitrary code (remote code execution, RCE). You should be very aware of that vulnerability as Confluence servers are a very attractive target for initial access to a corporate network. Therefore, systems …

Serious security vulnerabilities in Atlassian Confluence affect many organizations Read More »

White Paper — Registration

You will receive the research paper by mail.

Codenotary — Webinar

White Paper — Registration

Please let us know where we can send the whitepaper on Codenotary Trusted Software Supply Chain. 

Become a partner

Start Your Trial

Please enter contact information to receive an email with the virtual appliance download instructions.

Start Free Trial

Please enter contact information to receive an email with the free trial details.

Subscribe to our newsletter