Remove tag Supply Chain
article thumbnail

Strengthening the Nessus Software Supply Chain with SLSA

Tenable

But sometimes we like to give you a peek behind the curtain to share how we protect our own house against cyberattacks – and that’s what this blog is about. Today we’re sharing our experience adopting the supply-chain security framework SLSA, with the hopes that the lessons we learned will be helpful to you.

article thumbnail

What’s New in FlexDeploy 6.0

Flexagon

We have recently published a number of blogs on these new features, but you may be wondering what else is new and coming with FlexDeploy 6.0. Access recent, indicate favorites for quicker access, and tag several types of objects and search by tag. Software Supply Chain Security. The upcoming FlexDeploy 6.0

UI/UX 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Unpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflows

Prisma Clud

In today’s post, we look at action pinning, one of the profound mitigations against supply chain attacks in the GitHub Actions ecosystem. So pinning an action to a full commit hash protects us from this type of supply chain attack, right? The action pulls the latest tag — but it’s mutable and subject to change.

article thumbnail

The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree

Prisma Clud

Get an in-depth look at the attack vectors, technical details and a real-world demo in this blog post highlighting our latest research. Reference a tag. Figure 8: Calling an action using a tag We can use the secrets exfiltrated in the flow to infect the repository with malicious code. Reference a commit hash. Reference a branch.

Malware 144
article thumbnail

Robotic Process Automation (RPA) in Supply Chain Management: Use Cases and Implementation Tips

Altexsoft

Supply chains involve complex webs of interconnected processes. Pull one thread, and the cascading effect of that change can shift the entire chain. It should thus come as no surprise that automation, delivered via technological innovation, has found a home in multiple supply chain functions. What is RPA?

article thumbnail

Enhancing Transportation Cybersecurity and Fleet Management for the DoD

Tenable

In this blog post, we’ll outline the challenges involved in protecting the DoD’s transportation systems from cyberattacks, and offer OT security recommendations. Ensuring the security of the DoD's transportation network is certainly a technical challenge - but within the military context, it's also a matter of national security.

article thumbnail

KubeCon EU 2023: Themes, Talks, and (Movie) Trailers

Daniel Bryant

Please come and find us to learn more about Envoy Gateway , Emissary-ingress , Telepresence , or TAG Contributors ! TAG Contributor Strategy: What We Get Out of It (and You Could Too!) (16:30–17:05, TAG CS members share how giving back has shaped their careers, advanced their skills, and grown their own communities.