image of blog Gal Ofri

Gal Ofri

Showing all posts by Gal Ofri

Legit Security | In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.

SLSA Provenance Blog Series, Part 4: Implementation Challenges for SLSA Provenance for Enterprises

January 24, 2024

In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.

Read More
Legit Security | In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.

SLSA Provenance Blog Series, Part 3: The Challenges of Adopting SLSA Provenance

December 28, 2023

In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.

Read More
Legit Security | In this blog series, we uncover the details of SLSA provenance which refers to the ability to trust the authenticity of artifacts.

SLSA Provenance Blog Series, Part 2: Deeper Dive Into SLSA Provenance

May 22, 2023

In this blog series, we uncover the details of SLSA provenance which refers to the ability to trust the authenticity of artifacts.

Read More
Legit Security | In this blog series, we uncover the details of SLSA provenance which refers to the ability to trust the authenticity of artifacts.

SLSA Provenance Blog Series, Part 1: What Is Software Attestation

May 09, 2023

In this blog series, we uncover the details of SLSA provenance which refers to the ability to trust the authenticity of artifacts.

Read More
As software technology continues to evolve, it’s become more important than ever to ensure a secure software supply chain. Here are 4 types of risks every CISO should know.

Software Supply Chain Risks: What Every CISO Needs to Know

September 22, 2022

As software technology continues to evolve, it’s become more important than ever to ensure a secure software supply chain. Here are 4 types of risks every CISO should know.

Read More
Malicious actors are poisoning your artifacts in an attempt to infect your software supply chain so that you deploy those compromised artifacts to your production servers.

Why You Can Still Get Hacked Even After Signing Your Software Artifacts

September 19, 2022

Malicious actors are poisoning your artifacts in an attempt to infect your software supply chain so that you deploy those compromised artifacts to your production servers.

Read More
A popular vendor of Magento-Wordpress plug-ins/integrations with 200,000 downloads, has been hacked. This attack is a reminder that malicious 3rd party plug-ins for popular platforms, in this case FishPig integrations for Magento e-commerce platforms, can open the door to critical vulnerabilities.

New Software Supply Chain Attack Installs Trojans on Adobe's Magento E-Commerce Platform

September 15, 2022

A popular vendor of Magento-Wordpress plug-ins/integrations with 200,000 downloads, has been hacked. This attack is a reminder that malicious 3rd party plug-ins for popular platforms, in this case FishPig integrations for Magento e-commerce platforms, can open the door to critical vulnerabilities.

Read More
What is an #SBOM, how is it used and why it is important to software supply chain security? We explain the SBOM in 5 minutes, discuss where SBOM adoption is headed and help you think beyond SBOM to gain greater visibility and security across your entire software supply chain environment.

What is an SBOM? SBOM explained in 5 minutes

April 11, 2022

What is an #SBOM, how is it used and why it is important to software supply chain security? We explain the SBOM in 5 minutes, discuss where SBOM adoption is headed and help you think beyond SBOM to gain greater visibility and security across your entire software supply chain environment.

Read More

Request a demo including the option to analyze your own software supply chain.