Chainguard

Breaking down the numbers: Q3 2024 cybersecurity funding activity recap
We present a list of selected cybersecurity companies that received funding during the third quarter of 2024 (Q3 2024). Apono October | 15.5 million Apono has raised $15.5 …

Chainguard raises $140 million to strengthen open source software security
Chainguard has completed a $140 million Series C round of funding led by Redpoint Ventures, Lightspeed Venture Partners, and IVP, bringing the company’s total funding …

NIST’s NVD has encountered a problem
Whether the cause is insurmountable technical debt, lack of funds, a third reason or all of them, NIST’s National Vulnerability Database (NVD) is struggling, and …

CISOs vs. developers: A battle over security priorities
A majority of both developers and CISOs view software supply chain security as a top priority in their roles (70% and 52% respectively), according to Chainguard. However, …

Unraveling the importance of software supply chain security
The software supply chain encompasses the entire lifecycle of a software product, from its conception and development to its distribution and deployment. It involves a complex …

Wolfi Linux provides the control needed to fix modern supply chain threats
There’s been a massive push for supply chain security in the last few years: integrity protection, vulnerability management, and transparency. This push has left …

Wolfi: A Linux undistro with security measures for the software supply chain
Wolfi is a new community Linux undistribution that combines the best aspects of existing container base images with default security measures that will include software …

Government guide for supply chain security: The good, the bad and the ugly
Just as developers and security teams were getting ready to take a breather and fire up the BBQ for the holiday weekend, the U.S.’s most prestigious security agencies (NSA, …

Sigstore: Signature verification for protection against supply chain attacks
Software supply chain attacks have been increasing over the past few years, spurring the Biden administration to release an executive order detailing what government agencies …

New infosec products of the week: April 29, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Akamai, Alert Logic, BreachBits, Kudelski Security, ThreatX, and Workato. Alert …

Chainguard Enforce protects organizations from supply chain threats
Chainguard announced its first product, Chainguard Enforce, an open source software supply chain security solution for Kubernetes workloads. Chainguard Enforce enables clients …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility