software supply chain
BellSoft’s 3-in-1 Strategy for Container Security
BellSoft debuts Hardened Images for Kubernetes, reducing vulnerabilities with locked, lightweight containers built on Alpaquita Linux and Liberica JDK for secure performance ...
Jeff Burt | | 3-in-1 approach, AI threats, Chainguard, cloud native security, cloud security, container hardening, container incidents, container security, container vulnerabilities, containerized applications, CVE remediation, distroless containers, hardened containers, Hardened Images, Java runtime optimization, kubernetes, lightweight Linux, regulatory compliance, runtime security, secure container images, secure DevOps, software supply chain, Vulnerability Management
CNCF and Docker: The Next Phase of Cloud Native Supply Chain Evolution
The CNCF–Docker partnership strengthens cloud native supply chain security with verified namespaces, SBOMs, and signed images. Trust becomes the new baseline ...
Enhancing Kubernetes Security in Your Software Supply Chains With TLS certificates
Utilizing TLS certificates properly in your software supply chains can help decrease the chances of a cybersecurity incident, such as a supply chain attack or a man-in-the-middle attack ...
Sweet Security Unfurls Cloud-Native Runtime Protection Platform
Sweet Security today launched a Cloud Runtime Security Suite platform for securing cloud-native application runtimes ...
Chainguard Adds Automatic SBOM Generation Capability
Chainguard added an ability to automatically generate an SBOM for containers to its Enforce control plane to secure cloud-native applications ...
Why You Need a Kubernetes Bill of Materials (KBOM)
You’ve probably heard of software bills of materials (SBOMs). And you may already be familiar with infrastructure bills of materials (IBOM) as well. Both ideas are garnering much attention lately as a ...
Sigstore Sets Out to Secure Cloud-Native Supply Chain
Open source software (OSS) is pervasive — 90% of companies are now using OSS. But this reliance is a double-edged sword. Amid rising software supply chain attacks, we’re witnessing the fragility of ...

