Showing all posts by Gal Ofri
![Legit Security | In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/Legit%20Security%20-%20SLSA%20Provenance%20Series%20Part%204%20-%20Featured%20Image.png?width=740&height=220&name=Legit%20Security%20-%20SLSA%20Provenance%20Series%20Part%204%20-%20Featured%20Image.png)
![Legit Security | In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/Legit%20Security%20Blog%20-%20SLSA%20Provenance%20Series%20Part%203%20v1-1.png?width=740&height=220&name=Legit%20Security%20Blog%20-%20SLSA%20Provenance%20Series%20Part%203%20v1-1.png)
![Legit Security | In this blog series, we uncover the details of SLSA provenance which refers to the ability to trust the authenticity of artifacts.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/Blog%20What%20is%20Software%20Attestation%20%2810%29.png?width=740&height=220&name=Blog%20What%20is%20Software%20Attestation%20%2810%29.png)
![Legit Security | In this blog series, we uncover the details of SLSA provenance which refers to the ability to trust the authenticity of artifacts.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/Blog%20What%20is%20Software%20Attestation%20%289%29.png?width=740&height=220&name=Blog%20What%20is%20Software%20Attestation%20%289%29.png)
![As software technology continues to evolve, it’s become more important than ever to ensure a secure software supply chain. Here are 4 types of risks every CISO should know.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/CISO%20Security%20Blog.jpg?width=740&height=220&name=CISO%20Security%20Blog.jpg)
Software Supply Chain Risks: What Every CISO Needs to Know
As software technology continues to evolve, it’s become more important than ever to ensure a secure software supply chain. Here are 4 types of risks every CISO should know.
Read More![Malicious actors are poisoning your artifacts in an attempt to infect your software supply chain so that you deploy those compromised artifacts to your production servers.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/Artifact%20Poisoning%20Blog.jpg?width=740&height=220&name=Artifact%20Poisoning%20Blog.jpg)
Why You Can Still Get Hacked Even After Signing Your Software Artifacts
Malicious actors are poisoning your artifacts in an attempt to infect your software supply chain so that you deploy those compromised artifacts to your production servers.
Read More![A popular vendor of Magento-Wordpress plug-ins/integrations with 200,000 downloads, has been hacked. This attack is a reminder that malicious 3rd party plug-ins for popular platforms, in this case FishPig integrations for Magento e-commerce platforms, can open the door to critical vulnerabilities.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/FishPig%20Hack%20Blog.jpg?width=740&height=220&name=FishPig%20Hack%20Blog.jpg)
New Software Supply Chain Attack Installs Trojans on Adobe's Magento E-Commerce Platform
A popular vendor of Magento-Wordpress plug-ins/integrations with 200,000 downloads, has been hacked. This attack is a reminder that malicious 3rd party plug-ins for popular platforms, in this case FishPig integrations for Magento e-commerce platforms, can open the door to critical vulnerabilities.
Read More![What is an #SBOM, how is it used and why it is important to software supply chain security? We explain the SBOM in 5 minutes, discuss where SBOM adoption is headed and help you think beyond SBOM to gain greater visibility and security across your entire software supply chain environment.](https://20956152.fs1.hubspotusercontent-na1.net/hub/20956152/hubfs/SBOM%20image.jpg?width=740&height=220&name=SBOM%20image.jpg)
What is an SBOM? SBOM explained in 5 minutes
What is an #SBOM, how is it used and why it is important to software supply chain security? We explain the SBOM in 5 minutes, discuss where SBOM adoption is headed and help you think beyond SBOM to gain greater visibility and security across your entire software supply chain environment.
Read MoreRequest a Demo
Request a demo including the option to analyze your own software supply chain.