Tag

software supply chain

1 views collected around this technical thread.

Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 8, 2025 · Information Security

Why SBOMs Are the Key to Secure Software Supply Chains

This article explains how Software Bill of Materials (SBOM) mirrors hardware BOMs, outlines their core differences, presents best practices, tools, and implementation strategies to improve supply‑chain transparency, compliance, and security for modern software development.

Best PracticesComplianceSBOM
0 likes · 12 min read
Why SBOMs Are the Key to Secure Software Supply Chains
Continuous Delivery 2.0
Continuous Delivery 2.0
Jun 7, 2025 · Information Security

Unlocking Software Supply Chain Security with SBOM

This article explains how Software Bill of Materials (SBOM) serves as a digital map for component dependency and change management, detailing its functions in visualizing dependencies, detecting version conflicts, ensuring license compliance, and providing supply‑chain risk alerts, ultimately improving development efficiency, security, and regulatory compliance.

ComplianceSBOMSecurity
0 likes · 11 min read
Unlocking Software Supply Chain Security with SBOM
Continuous Delivery 2.0
Continuous Delivery 2.0
May 18, 2025 · Information Security

Software Supply Chain Security: Importance, Challenges, Standards, and Emerging Technologies

The article examines the critical importance of software supply chain security, outlines frequent attacks and real‑world cases, discusses national standards and compliance measures, and highlights emerging AI‑driven and blockchain‑based innovations that aim to protect the entire software lifecycle.

AISBOMSecurity
0 likes · 8 min read
Software Supply Chain Security: Importance, Challenges, Standards, and Emerging Technologies
Tencent Technical Engineering
Tencent Technical Engineering
Mar 27, 2025 · Information Security

AI Programming Assistants Can Be Hijacked: Configuration File Poisoning and Security Risks

AI programming assistants such as GitHub Copilot and Cursor can be hijacked through poisoned configuration files that hide malicious prompts using invisible Unicode characters, exposing developers to risks like data leakage, DDoS, cryptomining and trojan injection, so they must avoid unknown configs, sandbox generated code, and employ static analysis and AI audits to mitigate threats.

AI securityConfiguration Filescode poisoning
0 likes · 12 min read
AI Programming Assistants Can Be Hijacked: Configuration File Poisoning and Security Risks
DevOps
DevOps
Nov 26, 2024 · Information Security

10 Best‑Practice Principles for Implementing a Secure Development Lifecycle (SDL)

This article outlines ten essential best‑practice principles for implementing a Secure Development Lifecycle (SDL), covering top‑down leadership, alignment with existing management systems, visualizable processes, security goal classification, componentized security capabilities, supply‑chain management, service‑oriented SDL, DevSecOps toolchains, continuous optimization, and staff training.

Best PracticesDevSecOpsSDL
0 likes · 17 min read
10 Best‑Practice Principles for Implementing a Secure Development Lifecycle (SDL)
IT Services Circle
IT Services Circle
Jun 15, 2024 · Information Security

How Researchers Built a Malicious VSCode Extension in 30 Minutes and Exposed Marketplace Security Flaws

A security research team created a counterfeit VSCode extension in half an hour, demonstrated how easily malicious code can be injected and distributed through the VSCode Marketplace, and revealed that dozens of high‑value companies, security firms and even a national court were compromised, highlighting critical gaps in extension vetting and supply‑chain protection.

VSCodeinformation securitymalicious extension
0 likes · 10 min read
How Researchers Built a Malicious VSCode Extension in 30 Minutes and Exposed Marketplace Security Flaws
DevOps Engineer
DevOps Engineer
Dec 5, 2023 · Information Security

Using Witness for Software Supply Chain Security in Non‑GitHub Environments

This article explains how to generate and verify software artifact provenance with the Witness framework in non‑GitHub ecosystems, covering installation, key creation, configuration, running, signing, and policy verification to achieve higher SLSA levels.

ProvenanceSLSASecurity
0 likes · 10 min read
Using Witness for Software Supply Chain Security in Non‑GitHub Environments
DevOps
DevOps
Nov 9, 2023 · Information Security

Introducing SLSA: An End‑to‑End Framework for Software Supply Chain Integrity

This article translates Google's SLSA framework paper, explaining software supply chain threats, the four SLSA levels, mitigation strategies, a provenance generation example, and concluding with its impact on software security, while also noting related DevOps certification offerings.

DevOpsProvenanceSLSA
0 likes · 12 min read
Introducing SLSA: An End‑to‑End Framework for Software Supply Chain Integrity
DevOps Engineer
DevOps Engineer
Jun 11, 2023 · Information Security

Understanding SLSA: A Guide to Software Supply Chain Security and Levels

This article explains the SLSA (Supply chain Levels for Software Artifacts) framework, outlines common software supply‑chain threats, details the four SLSA levels and their requirements, discusses limitations, and reviews tools such as OpenSSF Scorecard, slsa‑verifier and Sigstore for improving software artifact integrity.

SLSASecurityartifact provenance
0 likes · 15 min read
Understanding SLSA: A Guide to Software Supply Chain Security and Levels
Efficient Ops
Efficient Ops
Mar 29, 2023 · Information Security

Securing the Software Supply Chain in Agile Development

This article examines the rising software supply‑chain security risks in fast‑paced agile development, outlines regulatory pressures, and presents a comprehensive management framework—including policies, dynamic asset views, full‑lifecycle risk identification, and DevSecOps practices—to help enterprises mitigate vulnerabilities and ensure secure delivery.

Agile DevelopmentDevSecOpsSecurity
0 likes · 8 min read
Securing the Software Supply Chain in Agile Development
DevOps
DevOps
Mar 20, 2023 · Information Security

2023 DevSecOps Forecast: Five Key Trends Shaping Software Supply Chain Security, AI/ML Integration, and Observability

The 2023 DevSecOps forecast highlights five major trends—including prioritizing software supply‑chain security, embedding security education in DevOps, pervasive AI/ML across the SDLC, deeper value‑stream analysis, and left‑shifting observability—while emphasizing zero‑trust, SBOM adoption, and the growing role of security in cloud‑native environments.

AI/MLDevSecOpsSecurity
0 likes · 7 min read
2023 DevSecOps Forecast: Five Key Trends Shaping Software Supply Chain Security, AI/ML Integration, and Observability
Continuous Delivery 2.0
Continuous Delivery 2.0
Jan 10, 2023 · Information Security

Understanding Software Supply Chain Security and the SLSA Framework

The article explains why software supply chain security is increasingly critical, introduces the SLSA (Supply‑Chain Levels for Software Artifacts) framework and its three trust boundaries, outlines common risk points from code commit to package distribution, and discusses mitigation strategies such as mandatory code review, robot‑account controls, and automation.

Code ReviewSLSASecurity
0 likes · 11 min read
Understanding Software Supply Chain Security and the SLSA Framework
DevOps
DevOps
Oct 11, 2022 · Operations

Key Findings from the 2022 Accelerate State of DevOps Report: Security, Software Supply Chain, and Cloud Adoption

The 2022 Accelerate State of DevOps Report reveals that while application‑level security scanning in CI/CD pipelines is widely adopted, organizational culture, cloud adoption, and performance metrics significantly influence DevOps effectiveness, with overall performance declining amid pandemic‑related challenges.

DORA ReportDevOpsSecurity
0 likes · 6 min read
Key Findings from the 2022 Accelerate State of DevOps Report: Security, Software Supply Chain, and Cloud Adoption
DevOps Cloud Academy
DevOps Cloud Academy
Sep 27, 2022 · Information Security

Securing Version Control Systems and CI/CD Pipelines in the Software Supply Chain

The article explains how vulnerabilities in version control systems and CI/CD pipelines can expose the software supply chain to attacks and provides best‑practice recommendations for hardening VCS configurations, branch protection, least‑privilege access, secure testing environments, and credential management.

CI/CD securityDevOpsVCS security
0 likes · 9 min read
Securing Version Control Systems and CI/CD Pipelines in the Software Supply Chain
DevOps Cloud Academy
DevOps Cloud Academy
Jul 21, 2022 · Information Security

Insights on DevSecOps and Code‑Vaccine Technology from XMirror Security Founder

In a detailed interview, XMirror Security founder Zi‑Ya discusses the origins of his team, the core elements of DevSecOps, the innovative code‑vaccine technology combining IAST and RASP, maturity stages of development security in China, and future trends in software‑supply‑chain security.

Code VaccineDevSecOpsIAST
0 likes · 10 min read
Insights on DevSecOps and Code‑Vaccine Technology from XMirror Security Founder
DevOps Cloud Academy
DevOps Cloud Academy
Apr 19, 2022 · Fundamentals

Fifteen Guidelines for a Healthy Software Supply‑Chain Dependency Management (Part 2)

This article presents a comprehensive set of fifteen best‑practice guidelines—nine pre‑inclusion checks and six post‑inclusion usage rules—covering design review, code quality, automated testing, debugging, licensing, transitive dependencies, security, and upgrade strategies to ensure a robust and secure software supply chain.

Best PracticesSecuritydependency-management
0 likes · 19 min read
Fifteen Guidelines for a Healthy Software Supply‑Chain Dependency Management (Part 2)
Continuous Delivery 2.0
Continuous Delivery 2.0
Apr 19, 2022 · Fundamentals

Fifteen Guidelines for Ensuring a Healthy Software Supply Chain – Dependency Management (Part 2)

This article presents fifteen practical guidelines for managing software dependencies, covering pre‑inclusion checks such as design review, code quality, testing, security, licensing, and transitive dependencies, as well as post‑use practices like encapsulation, isolation, update strategies, and continuous monitoring to maintain a secure and reliable supply chain.

Best PracticesSecuritydependency-management
0 likes · 19 min read
Fifteen Guidelines for Ensuring a Healthy Software Supply Chain – Dependency Management (Part 2)