• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: sbom

Codenotary Introduces First Continuous Background Vulnerability Scanning

July 12, 2022 TechDecisions Staff Leave a Comment

Trustcenter offers an always up-to-date background scanning for any artifact, build, or software stack – customers never miss vulnerabilities HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, leaders in software supply chain security, today announced that the company’s flagship product, Trustcenter, now offers the first integrated solution to support an always up-to-date background scanning for any artifact, build, or software stack. […]

Read More

Codenotary First to Provide Continuously Updated and Fully Searchable Tamper-Proof Information about Software Components in Container Images

June 28, 2022 TechDecisions Staff Leave a Comment

SBOM Operator for Kubernetes allows users to continuously be aware of all software and software dependencies running in Kubernetes HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, leaders in software supply chain security, today launched SBOM Operator for Kubernetes in both its open source Community Attestation Service, as well as Codenotary’s Trustcenter, the company’s flagship product, that mitigates the risk of […]

Read More

Codenotary First to Offer Integrated Solution for Compliance for Integrity of Supply Chain Software

June 15, 2022 TechDecisions Staff Leave a Comment

Condenotary Cloud provides zero-trust with immutable data storage in one integrated package; enables organizations to conform with supply-chain levels for software artifacts (SLSA) HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, leaders in software supply chain security, today announced that the company’s flagship product, Codenotary Cloud, is now the first all-in-one offering that allows organizations to attain compliance with the industry-standard […]

Read More

Open Source Security

How the IT Industry is Securing Open-Source Software

The IT industry and the U.S. government have outlined a 10-step plan to secure open-source software and the IT supply chain.

May 16, 2022 Zachary Comeau Leave a Comment

The IT industry and the U.S. government have outlined a 10-step plan to ensure the security of open-source software and the IT supply chain after a series of supply chain attacks and open-source software vulnerabilities were discovered in recent years. The plan is designed to secure the production of open-source software, improve vulnerability discovery and […]

Read More

Codenotary Adds Vulnerability Scanning to Popular Community Platform for Open Source Supply Chain Security

May 11, 2022 TechDecisions Staff Leave a Comment

Community Attestation Service addresses need for integrated, continuous security for developers HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, leaders in software supply chain security, today announced the addition of the first-ever free background vulnerability scanning service combined with a free and open source Community Attestation Service (CAS) code signing and attestation service to further secure open source supply chains. Gartner […]

Read More

Codenotary Improves DevOps Security, Adds Observability for Kubernetes and VMware Environments

May 6, 2022 TechDecisions Staff Leave a Comment

Brings full-stack visibility to secure explosive growth of Kubernetes on vSphere HOUSTON–(BUSINESS WIRE)–#Kubernetes—Codenotary, leaders in tamper-proof data protection, today announced Kubernetes and VMware vSphere full-stack monitoring for operations and DevOps teams, providing all-in-one monitoring for Kubernetes and virtualized infrastructure. Kubernetes adoption is on the rise; according to the 2021 Cloud Native Survey, 96% of organizations […]

Read More

Binarly Partners With immune to Secure Hardware, Firmware and Software Supply Chain

May 3, 2022 TechDecisions Staff Leave a Comment

With firmware attacks becoming more and more complex, partnership creates a unique, next-generation solution capable of detecting known and unknown threats in multiple firmware components across devices. PASADENA, Calif.–(BUSINESS WIRE)–#firmware–Binarly Inc. and immune, GmbH have entered into a strategic partnership to deliver the most comprehensive device security solution to protect customers against hardware, firmware and […]

Read More

AlmaLinux and Home Assistant Now Independent Cryptographic Validators for Codenotary’s Free Service Enabling Supply Chain Security

April 27, 2022 TechDecisions Staff Leave a Comment

Independent validation by large open source projects further strengthens Community Attestation Service HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, leaders in software supply chain security, today announced it has added independent cryptographic validator nodes to its free and open source Community Attestation Service (CAS), providing another level of transparency, security and third-party verifiability of the data open-source projects notarize and […]

Read More

Finite State Launches New Solution for Asset Owners, Illuminating Blindspots in the Connected Device Supply Chain

April 18, 2022 TechDecisions Staff Leave a Comment

Maintain continuous software supply chain transparency through automated, comprehensive risk assessments that give teams full-spectrum visibility into the security state of devices MIAMI–(BUSINESS WIRE)–Finite State, the product security leader for connected devices, is launching Finite State for Asset Owners at the S4x22 Conference. The purpose-built solution automates and solves the complex challenges asset owners face […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Supply Chain Attacks Jump 51% In Second Half of 2021

Malicious actors are increasingly attacking the software supply chain, leading to renewed calls for supplier transparency.

April 12, 2022 Zachary Comeau Leave a Comment

Recent IT supply chain attacks such as the SolarWinds compromise, ransomware campaign that leveraged the Kaseya VSA platform or mass exploitation of the Log4j vulnerabilities have renewed focus on such attacks, which NCC Group says increased by 51% in the last half of 2021. The consulting and managed services firm’s global survey of 1,400 cybersecurity […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.