Tuesday, July 25, 2023
Security Boulevard
The Home of the Security Bloggers Network
Community Chats Webinars Library
Home
Cybersecurity News
Features
Industry Spotlight
News Releases
Security Bloggers Network
Latest Posts
Contributors
Syndicate Your Blog
Write for Security Boulevard
Webinars
Upcoming Webinars
Calendar View
On-Demand Webinars
Events
Upcoming Events
On-Demand Events
Chat
Security Boulevard Chat
Marketing InSecurity Podcast
Techstrong.tv Podcast
TechstrongTV - Twitch
Library
Related Sites
Techstrong Group
Cloud Native Now
DevOps.com
Security Boulevard
Techstrong Research
Techstrong TV
Techstrong.tv Podcast
Techstrong.tv - Twitch
Devops Chat
DevOps Dozen
DevOps TV
Media Kit
About Us
Sponsor
Analytics
AppSec
CISO
Cloud
DevOps
GRC
Identity
Incident Response
IoT / ICS
Threats / Breaches
More
Blockchain / Digital Currencies
Careers
Cyberlaw
Mobile
Social Engineering
Humor
Hot Topics
Account takeover fraud: 5 steps for protecting your customers
Seven Common Lateral Movement Techniques
Antisocial Media and Critical National Infrastructure
API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP
Infoline launches LogRhythm-Powered SOC to Deliver Crucial Cybersecurity Services in Malaysia
secure software supply chain
Cyber Resilience Act: The Future of Software in the European Union
Aaron Linskens
|
July 20, 2023
|
EU Cyber Resilience Act
,
News and Views
,
open source
,
Open source governances
,
secure software supply chain
Representatives of member states of the European Union (EU) reached a common agreement yesterday regarding the proposed Cyber Resilience Act (CRA) ...
Sonatype Blog
Software Packages, Do We Even Need Them?
Michael Prescott
|
May 1, 2023
|
Maven
,
Package Managers
,
secure software supply chain
...
Sonatype Blog
Supply Chain Security Inside and Out
Michael Prescott
|
April 26, 2023
|
Open Source Security
,
secure software supply chain
,
Sonatype Repository Firewall
...
Sonatype Blog
Power Up Your Dependencies: The Parallels of SBOMs and Mario Kart
Amanda Yeo
|
April 21, 2023
|
dependencies
,
FEATURED
,
open source
,
SBOM
,
secure software supply chain
...
Sonatype Blog
How to Convert Your SBOM Between SPDX and CycloneDX Formats
Aaron Linskens
|
April 21, 2023
|
DevSecOps
,
DevZone
,
open source
,
SBOM
,
secure software supply chain
...
Sonatype Blog
Sonatype’s Nexus Firewall is an Easy Solution for a Big Problem
Audra Davis-Hurst
|
April 3, 2023
|
FEATURED
,
malware prevention
,
Nexus Firewall
,
Nexus Platform
,
secure software supply chain
,
software supply chain automation
...
Sonatype Blog
Sonatype Repository Firewall is an Easy Solution for a Big Problem
Audra Davis-Hurst
|
April 3, 2023
|
FEATURED
,
malware prevention
,
secure software supply chain
,
software supply chain automation
,
Sonatype Platform
,
Sonatype Repository Firewall
...
Sonatype Blog
Post-Conference Tech Spec: Why Building Your Ship (Application) with Raw Materials is a Bad Idea
Aaron Linskens
|
March 31, 2023
|
DevSecOps
,
DevZone
,
open source
,
secure software supply chain
...
Sonatype Blog
Visualize Your Open Source Governance With BOM Doctor
Luke Mcbride
|
March 31, 2023
|
BOM Doctor
,
Open Source Tools
,
SBOM
,
sdlc
,
secure software supply chain
...
Sonatype Blog
Sonatype Lifecycle Enhancements Boost Speed, Security, and Productivity
Nitin Phadnis
|
March 30, 2023
|
Lifecycle Cloud
,
Nexus Lifecycle
,
Nexus Platform
,
open source
,
secure software supply chain
...
Sonatype Blog
Load more