SBOM

Your Application Development Organization Inadvertently Leaves Door Open for Hackers

“Most if not all of the hacker attacks on well-known companies in recent years didn’t come about because of weak perimeter defense. Indeed, perimeter defense has proven to be remarkably good. But nowadays, most attacks happen because of big gaps in the security of the development supply chain. In other words, vulnerabilities and malware enter …

Your Application Development Organization Inadvertently Leaves Door Open for Hackers Read More »

When hidden Java packages put your company at risk

The global software supply chain is complex and full of risk. The average software package has over 40 dependencies, which can be easily forgotten or inadvertently introduced during integration. It is important to maintain visibility into these hidden dependencies by using an SBOM (Software Bill of Materials) to understand what you are installing on your …

When hidden Java packages put your company at risk Read More »

Introducing the Developer’s Guide to SBOMs

As a concept, the Software Bill of Materials (SBOM) isn’t particularly complex: it’s a manifest that identifies the components that make up a particular software artifact. When we start looking at the practical implementation of SBOMs, however, a lot of complexity is suddenly introduced into the equation. You might be wondering what actually goes into …

Introducing the Developer’s Guide to SBOMs Read More »

Rust-based Ransomware can hit anywhere including Windows, Linux and VMware ESXi

While it’s great for application developers to write applications in a language that runs seamlessly on many different operating systems, there is a downside to the application’s intention. Ransomware has damaged many companies, causing downtime, money, and sleepless nights. Looking into some statistics you can find damage predictions of $265 billion by 2031. Writing Ransomware …

Rust-based Ransomware can hit anywhere including Windows, Linux and VMware ESXi Read More »

Detect unwanted dependencies in your software like versions of faker.js or colors.js

Last weekend the Open Source world was shaken up a bit when a developer maintaining the highly popular libraries faker.js and colors.js sabotaged both projects by breaking their function. The supply-chain dangers from underlying open-source projects were highlighted many times in 2021, the year that ended with the Log4j disaster. But as the new year …

Detect unwanted dependencies in your software like versions of faker.js or colors.js Read More »

White Paper — Registration

You will receive the research paper by mail.

Codenotary — Webinar

White Paper — Registration

Please let us know where we can send the whitepaper on Codenotary Trusted Software Supply Chain. 

Become a partner

Start Your Trial

Please enter contact information to receive an email with the virtual appliance download instructions.

Start Free Trial

Please enter contact information to receive an email with the free trial details.

Subscribe to our newsletter