Search by
Tags
Looking for your favourite topic? You're in the right place.
How to automate a secure chain of custody across your pipelines in 5 steps
Imagine you’re a Fintech CTO 🤓 with several teams and tens of microservices. Do you know what’s currently running in prod? How about yesterday? A week ago? Last month? And if you do know what’s in …
Is faster actually safer? How software physics beats human psychology
Sometimes doom-scrolling through Twitter has its rewards. A few weeks ago, in between the Ever Given🚢 memes (how we miss the big boat!) and the usual screams😱 into the void, I came across this tweet …
How to Ensure Software Provenance. Just like Google.
Google has always been a leader when it comes to security culture and their approach to managing a secure development lifecycle is no exception. This article introduces Google’s Binary Authorization …