Showing all posts by Gal Ofri


Software Supply Chain Risks: What Every CISO Needs to Know
As software technology continues to evolve, it’s become more important than ever to ensure a secure software supply chain. Here are 4 types of risks every CISO should know.
Read More
Why You Can Still Get Hacked Even After Signing Your Software Artifacts
Malicious actors are poisoning your artifacts in an attempt to infect your software supply chain so that you deploy those compromised artifacts to your production servers.
Read More
New Software Supply Chain Attack Installs Trojans on Adobe's Magento E-Commerce Platform
A popular vendor of Magento-Wordpress plug-ins/integrations with 200,000 downloads, has been hacked. This attack is a reminder that malicious 3rd party plug-ins for popular platforms, in this case FishPig integrations for Magento e-commerce platforms, can open the door to critical vulnerabilities.
Read More
What is an SBOM? SBOM explained in 5 minutes
What is an #SBOM, how is it used and why it is important to software supply chain security? We explain the SBOM in 5 minutes, discuss where SBOM adoption is headed and help you think beyond SBOM to gain greater visibility and security across your entire software supply chain environment.
Read MoreSchedule a Demo
Book a demo including the option to analyze your own software supply chain.