The CISO’s Guide to Supply Chain Security

Companies are software factories, pulling in components from upstream projects and also assembling and coding within their own enterprise. Hackers have noticed that code is a ripe target, containing credentials, secrets and valuable IP that can unlock other infrastructure. Today’s CISO’s and security leaders must understand their software supply chain and how to secure it […]

Webinar: How Secure is Your Internal Software Supply Chain?

Next week on January 25, BluBracket will join leaders from Snyk and The Linux Foundation to discuss the state of software supply chain in an exclusive webinar and what can be done to improve it. It’s a collaborative approach because each of participants will discuss a discrete aspect of software supply chain security: — The […]

Upcoming Live Discussion: Three Steps to Preventing Software Supply Chain Attacks

Tuesday, December 7, 2021 1:00 PM ET / 10:00 AM PT Click here to register. On Tuesday, December 7, 2021, BluBracket will be leading a live webinar about the relationship between code security and software supply chain attacks. You are invited to listen in and speak as a panelist while BluBracket’s own Maurice Evans and […]

How to help developers keep secrets out of code

What’s a secret? That’s a good question. But if you’re here, you probably already understand what a secret is, with regards to software engineering. You also understand that once code has been merged, detecting and fixing security related defects in code can cost your business time, money, and expose your organization to security risks. And […]

The Top Five Secrets Found in Code

Your code is not just a means for you to deploy an application, it’s also the means by which a hacker can gain access to a network or the data contained within or without. This has become even more apparent with the advent of cloud native development, where a single app or service consists of […]

New Webinar: How to Prevent Code Leaks

Most credential leaks from code happen in personal repositories, not sanctioned corporate ones. This happens because it’s so easy to clone and share code. Git by default is open and collaborative—good for open source but potentially a security risk if you don’t have the right tools and policies in place. In this one hour webinar […]