Categories

Resources categorized "Cybersecurity"

There are a total of (10) items.

The good, the bad and the ugly of the XZ vulnerability

Craig McLuckie /
Apr 1, 2024
Continue Reading

Securing AI / ML model supply chains

Adolfo "Puerco" García Veytia /
Mar 14, 2024
Continue Reading

How to detect and block malicious typosquatting attacks on open source packages

Pankaj Telang /
Mar 13, 2024
Continue Reading

How npm install scripts can be weaponized: A real-world example of a harmful npm package

Edward Thomson /
Mar 3, 2024
Continue Reading

Silent but deadly: Using Minder to detect and prevent homoglyph attacks on your code

Teodor Yanev /
Feb 28, 2024
Continue Reading

CVEs: The emperor's old clothes

Luke Hinds /
Feb 21, 2024
Continue Reading

Podcast: Craig McLuckie, CEO, on why he created Stacklok

Megan Bruce /
Jan 19, 2024
Learn more

Trust as a service for validating OSS dependencies

Megan Bruce /
Nov 14, 2023
Learn more

How the co-creator of Kubernetes is helping developers build safer software

Megan Bruce /
Nov 10, 2023
Learn more
Page 1 of 2