Securing GitHub Actions: Hardening Your CI/CD Supply Chain
GitHub Actions is a powerful CI/CD platform — and a significant attack surface. Here's how to lock it down against supply chain threats.
Deep dives, practical guides, and incident analyses from engineers who build Safeguard. No fluff, no vendor FUD — just what you need to ship secure software.
GitHub Actions is a powerful CI/CD platform — and a significant attack surface. Here's how to lock it down against supply chain threats.
Stop reporting vanity metrics. Here are the security measurements that actually inform decisions, demonstrate program effectiveness, and earn board-level credibility.
eBPF is being called the future of security observability. It is genuinely powerful, but it is not a magic bullet for runtime security.
Every Docker image is a stack of layers, and each one can introduce vulnerabilities. Learn how to dissect image layers for security risks and what tools actually help.
Trivy combines SBOM generation with vulnerability scanning in a single tool. Here's how to use both capabilities effectively.
CVE-2022-37042 allowed unauthenticated attackers to upload web shells to Zimbra email servers. Over 1,000 servers were compromised before most admins knew about it.
A single phishing campaign compromised over 130 companies including Cloudflare and Twilio. Here's how the 0ktapus attack chain worked.
Practical Docker security from image building to runtime, covering multi-stage builds, user namespaces, and image scanning.
Running pip install can execute arbitrary code on your machine before you ever import the package. Here is how install hooks create risk.
Weekly insights on software supply chain security, delivered to your inbox.