Our Blog

Cyber RiskAn image of futuristic cyber security
Doron Peri How Scribe Security Aligns with Gartner’s Leader’s Guide to Software Supply Chain Security

On June 20, 2024, Gartner released its influential Leader’s Guide to Software Supply Chain Security, highlighting the growing need to defend against software supply chain attacks. With these attacks’ increasing frequency and sophistication, organizations face significant risks that they must manage effectively. This post interprets the critical findings from Gartner’s report. It explains how Scribe […]

Read more
Cyber RiskAn image of AI and SSCS
Danny Nebenzahl The Impact of AI on Software Supply Chain Security

In an era where cyber threats are growing in both sophistication and scale, organizations are increasingly relying on artificial intelligence (AI) to strengthen their security frameworks. This trend is particularly significant in software supply chain security, where AI is becoming a crucial tool in identifying vulnerabilities, predicting emerging threats, and streamlining the development and deployment […]

Read more
Cyber RiskSCA vs SBOM banner
Nir Peleg SCA and SBOM: What’s the Difference?

That is associated with them in a given software application. Using SCA tools the entire codebase of an application is searched to find out all the open-source libraries and components used in the application, their versions are monitored and it also finds out the known vulnerabilities for those components.  Purpose of SCA The main objective […]

Read more
Cyber Risk
Doron Peri Comparing ASPM and CSPM: Understanding the Differences and Applications

It is critically important to secure Cloud Environments and Applications given that the world is now a global village. Two solutions that are critical for these purposes in organizations are Application Security Posture Management (ASPM) and Cloud Security Posture Management (CSPM). Each performs a security function, though they serve the function in different settings and […]

Read more
Cyber RiskAn image of compass over code
Doron Peri Navigating NSA’s SBOM Guidelines: Essential Steps for Effective Software Supply Chain Security

In today’s digital landscape, software security is paramount. The National Security Agency (NSA), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), has established comprehensive guidelines for Software Bill of Materials (SBOM) Management. These guidelines are crucial for organizations aiming to bolster their cybersecurity posture and mitigate risks in their software supply chain. Why […]

Read more
Cyber RiskBest practices image
Nir Peleg Software Supply Chain Security: The Top 7 Best Practices You Need to Know

In today’s interconnected digital landscape, ensuring the security of your software supply chain is paramount. The software supply chain encompasses all the processes and components involved in developing, building, and deploying software, and it is increasingly targeted by cyberattacks. Having worked with numerous companies and leveraging vast industry experience, I can confidently share some of […]

Read more
Cyber RiskImage of backdoor
Danny Nebenzahl SBOM Tools to the Rescue – the XZ Utils Backdoor Case

What is the XZ Utils (CVE-2024-3094) Backdoor? CVE-2024-3094, published at the beginning of April 2024, is a backdoor maliciously inserted into a Linux utility. It was detected by Andres Freund, a curious and security-aware Microsoft software engineer, on the verge of being integrated into main Linux distributions. Had this succeeded, an unimaginable number of servers […]

Read more
UncategorizedAI protection
Danny Nebenzahl Practical Steps Towards Protecting Your MLOps Pipeline

Imagine the next board meeting. You, a security leader in your organization, will present your standard deck with risks, mitigations, and incidents. Then, one of the board members will ask: How are you preparing to protect the new AI technologies and the MLOps pipelines that the company is already using?  Here is your answer. AI […]

Read more
Cyber RiskImage of clarity
Mikey Strauss From Chaos to Clarity: Navigating Policy Engine for Compliance

Welcome back to the second part of our blog series, where we delve deeper into the potent capabilities of Valint. In this article, we’ll focus on Valint’s policy engine and its pivotal role in assuring compliance throughout your supply chain. In our previous blog post, we provided an overview of Valint’s design principles. How the Policy Engine […]

Read more
Cyber RiskImage of application security
Barak Brudo What is ASPM?®

With the increasing complexity of applications and the proliferation of security threats, ensuring the security of software applications has become a significant challenge for organizations. Application Security Posture Management (ASPM) emerges as a solution to these challenges, providing a framework for improving visibility, managing vulnerabilities, and enforcing security controls across the software development lifecycle. The […]

Read more
1 2 3 4 6