image of blog Gal Ofri

Gal Ofri

Showing all posts by Gal Ofri

Legit Security | In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.

SLSA Provenance Blog Series, Part 4: Implementation Challenges for SLSA Provenance for Enterprises

January 24, 2024

In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.

Read More
Legit Security | In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.

SLSA Provenance Blog Series, Part 3: The Challenges of Adopting SLSA Provenance

December 28, 2023

In this blog series, we uncover the challenges of adopting SLSA provenance and discuss methods for overcoming those challenges.

Read More
Discover the SLSA framework, designed to ensure the integrity of software artifacts and enhance overall software supply chain security.

Deep Dive Into SLSA Provenance and Software Attestation

May 10, 2023

Discover the SLSA framework, designed to ensure the integrity of software artifacts and enhance overall software supply chain security.

Read More
Legit Security | In this blog series, we uncover the details of SLSA provenance which refers to the ability to trust the authenticity of artifacts.

SLSA Provenance Blog Series, Part 1: What Is Software Attestation

May 09, 2023

In this blog series, we uncover the details of SLSA provenance which refers to the ability to trust the authenticity of artifacts.

Read More
Discover four key supply chain risks every CISO must address as software technology evolves and security becomes crucial.

Software Supply Chain Risks to Be Aware of

September 22, 2022

Discover four key supply chain risks every CISO must address as software technology evolves and security becomes crucial.

Read More
Malicious actors are poisoning your artifacts to compromise your software supply chain. Learn how to protect your software artifacts and secure servers.

Software Artifacts Best Practices to Prevent Getting Hacked

September 19, 2022

Malicious actors are poisoning your artifacts to compromise your software supply chain. Learn how to protect your software artifacts and secure servers.

Read More
A popular vendor of Magento-Wordpress plug-ins/integrations with 200,000 downloads, has been hacked. This attack is a reminder that malicious 3rd party plug-ins for popular platforms, in this case FishPig integrations for Magento e-commerce platforms, can open the door to critical vulnerabilities.

New Software Supply Chain Attack Installs Trojans on Adobe's Magento E-Commerce Platform

September 15, 2022

A popular vendor of Magento-Wordpress plug-ins/integrations with 200,000 downloads, has been hacked. This attack is a reminder that malicious 3rd party plug-ins for popular platforms, in this case FishPig integrations for Magento e-commerce platforms, can open the door to critical vulnerabilities.

Read More
What is an #SBOM, how is it used and why it is important to software supply chain security? We explain the SBOM in 5 minutes, discuss where SBOM adoption is headed and help you think beyond SBOM to gain greater visibility and security across your entire software supply chain environment.

What is an SBOM? SBOM explained in 5 minutes

April 11, 2022

What is an #SBOM, how is it used and why it is important to software supply chain security? We explain the SBOM in 5 minutes, discuss where SBOM adoption is headed and help you think beyond SBOM to gain greater visibility and security across your entire software supply chain environment.

Read More

Request a demo including the option to analyze your own software supply chain.