Manning Publications(@ManningBooks) 's Twitter Profile Photo

šŸŒŸ Catch Thomas Vitale Thomas Vitale at DEVOXX UK this Wed! Dive into software supply chain security with live demos. šŸ“… May 8, Room A
šŸ“š Learn more: mng.bz/oeoj

account_circle
stacklok(@StackLokHQ) 's Twitter Profile Photo

Get ready, Open Source Summit North America attendees! Don't miss Craig McLuckie's keynote speech on the 17th at 10:20 AM PST! See details and add it to your schedule here: hubs.la/Q02sBzml0
Security

Get ready, Open Source Summit North America attendees! Don't miss Craig McLuckie's keynote speech on the 17th at 10:20 AM PST! See details and add it to your schedule here: hubs.la/Q02sBzml0
#SoftwareSupplyChain #OpenSourceSecurity #Sigstore #OpenSource #DeveloperCommunity
account_circle
Edgars | Kimaā€ '' šŸŠ''(@edgars_silis) 's Twitter Profile Photo

šŸŒ tea Protocol : a decentralized protocol securing the software supply chain, boosting sustainability, and integrity. It enables open-source developers to capture the value they create in a trustless manner.

account_circle
Ortelius Open Source Project(@OrteliusOs) 's Twitter Profile Photo

Attend SecureChainCon and learn about -toto and Gatekeeper from John Kjell at TestifySec. Security in the pipeline is critical, digs in. Learn More at ortelius.io/blog/2024/02/2ā€¦

Attend SecureChainCon and learn about #in-toto and #OPA Gatekeeper from John Kjell at TestifySec. Security in the pipeline is critical, #SecureChainCon digs in. #softwaresupplychain #cybersecurity #devops #devsecops Learn More at ortelius.io/blog/2024/02/2ā€¦
account_circle
Gƶkhan Gƶkalp(@GokGokalp) 's Twitter Profile Photo

Ive just published 'Securing the Supply Chain of Containerized Applications to Reduce Security Risks (Security Scanning,SBOMs,Signing&Verifying Artifacts) ā€“Part1'

EN: gokhan-gokalp.com/en/securing-thā€¦

TR: cozumpark.com/containerized-ā€¦

Ive just published 'Securing the Supply Chain of Containerized Applications to Reduce Security Risks (Security Scanning,SBOMs,Signing&Verifying Artifacts) ā€“Part1'

EN: gokhan-gokalp.com/en/securing-thā€¦

TR: cozumpark.com/containerized-ā€¦

#softwaresupplychain #container #security #sbom #devsecops
account_circle
MergeBase(@MergeBaseSecure) 's Twitter Profile Photo

Are you ready to take your defense against supply chain attacks to the next level? Join Jim Manico from Manicode Security, @JavaJulius & S Smith tomorrow for this exciting webinar on WAF & Runtime Protection!
Register: mergebase.com/waf-vs-java-ruā€¦

Are you ready to take your defense against supply chain attacks to the next level? Join @manicode, @JavaJulius & @shannonjsmith tomorrow for this exciting webinar on WAF & Runtime Protection! 
Register: mergebase.com/waf-vs-java-ruā€¦
#waf #runtimeprotection #softwaresupplychain
account_circle
ProjectDiscovery.io(@pdiscoveryio) 's Twitter Profile Photo

Sam Stewart, Co-Founder and CEO of Ensignia, will join us at to digest the current state of and leave with a recipe for building a healthier ecosystemā€”one link at a time. Donā€™t miss this and join us for free.

account_circle
Cole Kennedy(@colek42c) 's Twitter Profile Photo

For anyone looking for a last minute Halloween Costume... We hear that supply chain security experts get paid well... This kit could get you started. šŸ˜Ž šŸ’»

Stay safe out there in the digital world.

For anyone looking for a last minute Halloween Costume... We hear that supply chain security experts get paid well... This kit could get you started. šŸ˜Ž šŸ’» 

Stay safe out there in the digital world.

#halloween #cybersecurity #softwaresupplychain
account_circle
Encryption Consulting LLC(@encryptioncons) 's Twitter Profile Photo

Read our latest blog post to learn about the evolution of code signing and its crucial role in ensuring software authenticity and integrity.

ow.ly/yzgz50RzGe5

ing Pipeline

Read our latest blog post to learn about the evolution of code signing and its crucial role in ensuring software authenticity and integrity.

ow.ly/yzgz50RzGe5

#CodeSigning #CodeSign #SoftwareSecurity #CICD #CICDPipeline #HSM #SoftwareSupplyChain #SupplyChainAttack
account_circle
MergeBase(@MergeBaseSecure) 's Twitter Profile Photo

Join Jim Manico from Manicode Security , @JavaJulius & S Smith in this mini-webinar series on MergeBaseā€™s patented Java Runtime Protection.

Starting next Tuesday, January 17th at 10 am PST.

Check more info and register: mergebase.com/runtime-webinaā€¦

Join @manicode , @JavaJulius  & @shannonjsmith in this mini-webinar series on MergeBaseā€™s patented Java Runtime Protection. 

Starting next Tuesday, January 17th at 10 am PST. 

Check more info and register: mergebase.com/runtime-webinaā€¦

#runtimeprotection #sca #softwaresupplychain
account_circle
Ortelius Open Source Project(@OrteliusOs) 's Twitter Profile Photo

Attend SecureChainCon and learn about Software Supply Chain Security from Nael Fridhi, at Google Cloud. Security in the pipeline is critical, digs in. Learn More at ortelius.io/blog/2024/02/2ā€¦

Attend SecureChainCon and learn about #GoogleCloud Software Supply Chain Security from Nael Fridhi, at Google Cloud. Security in the pipeline is critical, #SecureChainCon digs in. #softwaresupplychain #cybersecurity #devops #devsecops Learn More at ortelius.io/blog/2024/02/2ā€¦
account_circle
Cisco DevNet(@CiscoDevNet) 's Twitter Profile Photo

šŸ“£ Miss our discussion on ? Join Ed Warnicke, Michael Chenetz, Ʀva black, Brandon Lum,Dan Lorenc, & Cole Kennedy
as they chat software supply chain. From historical mistakes to a single source of truth, we covered it!

On demand.šŸ“· cs.co/6013OQaOz

šŸ“£ Miss our discussion on #SoftwareSupplyChain #Security? Join @edwarnicke, @mchenetz, @aevavoom, @lumjjb,@lorenc_dan, & @colek42c
as they chat software supply chain. From historical mistakes to a single source of truth, we covered it!   

On demand.šŸ“· cs.co/6013OQaOz
account_circle
Dependency-Track(@DependencyTrack) 's Twitter Profile Photo

ā€œA Practical Approach to in CI/CD Part IIIā€Šā€”ā€ŠTracking SBOMs with Dependency-Trackā€ by Krzysztof Pranczk

itnext.io/a-practical-apā€¦

ā€œA Practical Approach to #SBOM in CI/CD Part IIIā€Šā€”ā€ŠTracking SBOMs with Dependency-Trackā€ by Krzysztof Pranczk

itnext.io/a-practical-apā€¦

#OWASP #SoftwareSupplyChain
account_circle
Katie Norton(@KatieDNorton1) 's Twitter Profile Photo

Excited to share Jim Mercer and my latest research - IDCā€™s first Software Supply Chain Security Market Glance - a high-level and illustrative graphical overview, laying out the key segments and identifying vendors that offer solutions in each.

Excited to share @JimBMercer and my latest research - @IDCā€™s first Software Supply Chain Security Market Glance - a high-level and illustrative graphical overview, laying out the key segments and identifying vendors that offer solutions in each. #softwaresupplychain
account_circle
Tomitribe(@tomitribe) 's Twitter Profile Photo

Addressing CVEs in Open Source can be a real challenge, especially when stakeholders aren't aligned. Learn how to reduce time, cost, and overhead in this blog post!
buff.ly/44P5Ecy

Addressing CVEs in Open Source can be a real challenge, especially when stakeholders aren't aligned. Learn how to reduce time, cost, and overhead in this blog post! 
buff.ly/44P5Ecy 

#Java #SoftwareSupplyChain #DevSecOps
account_circle