Running Containers in Rootless Mode: A Practical Security Guide
Root in the container often means root on the host. Rootless mode breaks that assumption. Here is how to run Docker and Podman without root and why it matters more than you think.
Deep dives, practical guides, and incident analyses from engineers who build Safeguard. No fluff, no vendor FUD — just what you need to ship secure software.
Root in the container often means root on the host. Rootless mode breaks that assumption. Here is how to run Docker and Podman without root and why it matters more than you think.
Post-Series B, your startup is becoming an enterprise. Security programs that worked for 30 engineers will not work for 300. Here is how to build security that scales with your ambitions.
The 3CX supply chain attack exposed critical gaps in how software vendors protect their build pipelines. Here are the concrete lessons.
The 3CX supply chain attack was a multi-stage operation linked to North Korea's Lazarus Group. Here's the full technical breakdown.
PyPI paused new user registration for most of May 20-23 after a March wave of typosquats and info-stealers flooded the index. Here is what happened and why.
FISMA's authorization framework creates strict requirements for software in federal systems. Here's how supply chain security fits into the ATO process.
How to secure Azure Container Registry with network isolation, content trust, and Microsoft Defender for Containers integration.
A bug in ChatGPT exposed user chat histories and payment information. Here's what happened and what it means for AI service security.
Traditional threat modeling focuses on your code. Supply chain threat modeling extends to every tool, dependency, and process that touches your software. Here is how to do it systematically.
Weekly insights on software supply chain security, delivered to your inbox.