- Blog
- Authors
- Gal Ofri
Gal Ofri
Showing all posts by Gal Ofri
Software Supply Chain Risks: What Every CISO Needs to Know
As software technology continues to evolve, it’s become more important than ever to ensure a secure software supply chain. Here are 4 types of risks every CISO should know.
Read MoreWhy You Can Still Get Hacked Even After Signing Your Software Artifacts
Malicious actors are poisoning your artifacts in an attempt to infect your software supply chain so that you deploy those compromised artifacts to your production servers.
Read MoreNew Software Supply Chain Attack Installs Trojans on Adobe's Magento E-Commerce Platform
A popular vendor of Magento-Wordpress plug-ins/integrations with 200,000 downloads, has been hacked. This attack is a reminder that malicious 3rd party plug-ins for popular platforms, in this case FishPig integrations for Magento e-commerce platforms, can open the door to critical vulnerabilities.
Read MoreWhat is an SBOM? SBOM explained in 5 minutes
What is an #SBOM, how is it used and why it is important to software supply chain security? We explain the SBOM in 5 minutes, discuss where SBOM adoption is headed and help you think beyond SBOM to gain greater visibility and security across your entire software supply chain environment.
Read MoreRequest a Demo
Request a demo including the option to analyze your own software supply chain.