<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Safeguard.sh Blog</title>
    <description>Insights on software supply chain security, SBOM compliance, and DevSecOps</description>
    <link>https://safeguard.sh/resources/blog</link>
    <atom:link href="https://safeguard.sh/feed.xml" rel="self" type="application/rss+xml"/>
    <language>en-us</language>
    <lastBuildDate>Sun, 26 Apr 2026 13:27:58 GMT</lastBuildDate>
    <managingEditor>hi@safeguard.sh (Safeguard Team)</managingEditor>
    <webMaster>hi@safeguard.sh (Safeguard Team)</webMaster>
    <ttl>60</ttl>
    <image>
      <url>https://safeguard.sh/icons/icon-192.png</url>
      <title>Safeguard.sh Blog</title>
      <link>https://safeguard.sh/resources/blog</link>
    </image>
    <item>
      <title><![CDATA[Building an Eval Suite for Your Security LLM Workflows]]></title>
      <description><![CDATA[If you use an LLM anywhere in your security program — triage, remediation, detection — you need an eval suite with the same rigor as your test suite. Here is a concrete harness: datasets, thresholds, CI gates, and drift detection.]]></description>
      <link>https://safeguard.sh/resources/blog/building-eval-suite-security-llm-workflows</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/building-eval-suite-security-llm-workflows</guid>
      <pubDate>Wed, 22 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Zero-Day Discovery With LLM-Augmented Reachability: A Safeguard Engine Walkthrough]]></title>
      <description><![CDATA[Pattern-matching scanners miss zero-days by definition. An engine that follows taint across package boundaries plus a model that hypothesizes exploit conditions can find what either would miss alone. Here is how that pipeline works end to end.]]></description>
      <link>https://safeguard.sh/resources/blog/zero-day-discovery-llm-augmented-reachability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zero-day-discovery-llm-augmented-reachability</guid>
      <pubDate>Sun, 19 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[2026 Q1 CVE Trend Analysis]]></title>
      <description><![CDATA[A data-driven look at CVE trends from Q1 2026: publication volume, severity distribution, exploitation patterns, and what the shifts mean for defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/2026-q1-cve-trend-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/2026-q1-cve-trend-analysis</guid>
      <pubDate>Sat, 18 Apr 2026 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[What Is a Software Supply Chain Attack? A 2026 Primer]]></title>
      <description><![CDATA[A grounded 2026 primer on software supply chain attacks: definitions, the four real attack vectors, landmark incidents, and where defenders should start.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-attack-primer-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-attack-primer-2026</guid>
      <pubDate>Fri, 17 Apr 2026 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Frontier LLM Vendors Are Not Your Supply Chain Security Vendor]]></title>
      <description><![CDATA[Coding agents from OpenAI, Anthropic, and Google are excellent tools. They are also not supply chain security platforms, and the assumption that they can replace one is already producing expensive gaps.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-llm-vendors-not-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-llm-vendors-not-supply-chain-security</guid>
      <pubDate>Thu, 16 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Total Cost of Ownership: Griffin AI vs Mythos]]></title>
      <description><![CDATA[List price is the easiest number to compare and the least interesting one. TCO over three years is where Griffin AI vs Mythos-class platforms actually diverge.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-total-cost-of-ownership</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-total-cost-of-ownership</guid>
      <pubDate>Thu, 16 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM vs. VEX: What's the Difference and When Do You Need Each?]]></title>
      <description><![CDATA[SBOMs tell you what is in your software. VEX tells you which of those components are actually exploitable. Here is how to use both without drowning in noise.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-vs-vex-when-do-you-need-each</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-vs-vex-when-do-you-need-each</guid>
      <pubDate>Wed, 15 Apr 2026 10:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How to Read a CycloneDX SBOM: A Line-by-Line Walkthrough]]></title>
      <description><![CDATA[A walkthrough of a CycloneDX 1.6 JSON document — metadata, components, services, dependencies, and vulnerabilities — with a real snippet and what to check first.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-read-a-cyclonedx-sbom-walkthrough</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-read-a-cyclonedx-sbom-walkthrough</guid>
      <pubDate>Mon, 13 Apr 2026 10:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Model Context Protocol Permissions Model Explained]]></title>
      <description><![CDATA[MCP's permissions model is subtle. Here is a careful walkthrough of how tool scoping, sampling, and resource access actually work in production.]]></description>
      <link>https://safeguard.sh/resources/blog/model-context-protocol-permissions-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/model-context-protocol-permissions-model</guid>
      <pubDate>Sun, 12 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Why LLMs Are Structurally Insecure (and What That Means for Your Pipeline)]]></title>
      <description><![CDATA[Language models are not insecure because of a bug you can patch. They are insecure by construction — non-deterministic, context-poisonable, and unreproducible. Here is how to reason about them without pretending otherwise.]]></description>
      <link>https://safeguard.sh/resources/blog/why-llms-are-structurally-insecure</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/why-llms-are-structurally-insecure</guid>
      <pubDate>Sun, 12 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Qilin Ransomware Supply Chain Tactics 2025]]></title>
      <description><![CDATA[Qilin became a top ransomware operator in 2024-2025 by pairing edge-device exploitation with managed service provider compromise. Here is the supply chain breakdown.]]></description>
      <link>https://safeguard.sh/resources/blog/qilin-ransomware-supply-chain-tactics-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/qilin-ransomware-supply-chain-tactics-2025</guid>
      <pubDate>Sat, 11 Apr 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Anthropic's Mythos Vulnerability Scanner: An Honest Assessment of Strengths, Weaknesses, and Reasons to Be Cautious]]></title>
      <description><![CDATA[Anthropic's Mythos model is generating buzz for AI-powered vulnerability detection. We break down what it does well, where it struggles, and why security teams should approach the results with healthy skepticism.]]></description>
      <link>https://safeguard.sh/resources/blog/anthropic-mythos-vulnerability-scanner-honest-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/anthropic-mythos-vulnerability-scanner-honest-review</guid>
      <pubDate>Fri, 10 Apr 2026 18:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The Limits of Single-Model Vulnerability Scanning: A Technical Analysis of the Mythos Approach]]></title>
      <description><![CDATA[Anthropic's Mythos model claims to find vulnerabilities in open-source code using a single LLM. We analyze where this approach falls short and why production-grade zero-day discovery requires Safeguard's Multi-Agent TAOR Deep Think AI Engine.]]></description>
      <link>https://safeguard.sh/resources/blog/single-model-vulnerability-scanning-limitations-mythos-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/single-model-vulnerability-scanning-limitations-mythos-analysis</guid>
      <pubDate>Fri, 10 Apr 2026 15:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[API Surface Reviewed: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Most platform comparisons stop at features. The API surface is where automation and integration actually happen — and where vendors quietly diverge.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-api-surface-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-api-surface-review</guid>
      <pubDate>Fri, 10 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Why LLM-Based Vulnerability Scanning Needs More Than a Single Model]]></title>
      <description><![CDATA[Large language models are being used to find vulnerabilities in open-source code. But a single model, no matter how capable, isn't enough. Here's why multi-agent orchestration, structured CWE analysis, and deep context matter more than model size.]]></description>
      <link>https://safeguard.sh/resources/blog/why-llm-vulnerability-scanning-needs-more-than-a-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/why-llm-vulnerability-scanning-needs-more-than-a-model</guid>
      <pubDate>Fri, 10 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The EU Cyber Resilience Act Explained for Software Vendors]]></title>
      <description><![CDATA[What the EU CRA actually requires from software vendors — SBOMs, vulnerability handling, CE marking, timelines through 2027, and penalties up to EUR 15M.]]></description>
      <link>https://safeguard.sh/resources/blog/eu-cyber-resilience-act-explained-for-software-vendors</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eu-cyber-resilience-act-explained-for-software-vendors</guid>
      <pubDate>Fri, 10 Apr 2026 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Launching Zero-Day Discovery: How Safeguard's Multi-Agent TAOR Deep Think AI Engine Finds Vulnerabilities Before Anyone Else]]></title>
      <description><![CDATA[Safeguard.sh launches its Zero-Day Discovery Engine, powered by the Multi-Agent TAOR Deep Think AI Engine — a multi-lead, multi-sub-agent architecture that performs deep CWE analysis on open-source packages to uncover vulnerabilities that traditional scanners miss.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-zero-day-discovery-taor-architecture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-zero-day-discovery-taor-architecture</guid>
      <pubDate>Fri, 10 Apr 2026 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[EU AI Act Enforcement Begins: 2026 Reality Check]]></title>
      <description><![CDATA[A 2026 reality check on EU AI Act enforcement: which obligations are active, what regulators expect, and the technical evidence enterprises must produce.]]></description>
      <link>https://safeguard.sh/resources/blog/eu-ai-act-enforcement-begins-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eu-ai-act-enforcement-begins-2026</guid>
      <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Open Source vs Commercial Security Scanners 2026]]></title>
      <description><![CDATA[When to use Trivy, Grype, and OSV-Scanner versus commercial scanners in 2026: honest tradeoffs, integration realities, and decision criteria.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-vs-commercial-security-scanners-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-vs-commercial-security-scanners-2026</guid>
      <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[LLM Traces and Evals: The Missing Layer in AI Supply Chain Security]]></title>
      <description><![CDATA[Prompt traces and offline evals are standard hygiene for ML teams, but almost nobody treats them as supply chain telemetry. They should be. Here's how traces and evals plug into SBOM and reachability as a fourth security signal.]]></description>
      <link>https://safeguard.sh/resources/blog/llm-traces-and-evals-ai-supply-chain-signal</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/llm-traces-and-evals-ai-supply-chain-signal</guid>
      <pubDate>Wed, 08 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Reachability Analysis vs. SCA: Which Reduces Your Backlog?]]></title>
      <description><![CDATA[SCA lists every CVE in every dependency. Reachability filters to the ones your code actually invokes. Here is how the two compare on a real backlog.]]></description>
      <link>https://safeguard.sh/resources/blog/reachability-vs-sca-vulnerability-backlog</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/reachability-vs-sca-vulnerability-backlog</guid>
      <pubDate>Wed, 08 Apr 2026 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Go Toolchain Supply Chain Risks: 2025 Research]]></title>
      <description><![CDATA[2025 research on Go toolchain supply chain risks: module proxy abuse, replace directive attacks, cgo linker vectors, and the hardening patterns Go shops should adopt.]]></description>
      <link>https://safeguard.sh/resources/blog/go-toolchain-supply-chain-risks-2025-research</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-toolchain-supply-chain-risks-2025-research</guid>
      <pubDate>Mon, 06 Apr 2026 09:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CISA KEV Catalog Growth Analysis 2025-2026]]></title>
      <description><![CDATA[A data-grounded analysis of CISA Known Exploited Vulnerabilities catalog growth through 2025 and 2026, and the operational implications for defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-kev-catalog-growth-analysis-2025-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-kev-catalog-growth-analysis-2025-2026</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CycloneDX 1.7 New Features Reviewed]]></title>
      <description><![CDATA[CycloneDX 1.7 brings richer ML-BOM, better attestations, and VEX tightening. A practical review of what changed and what it means for your SBOM pipeline.]]></description>
      <link>https://safeguard.sh/resources/blog/cyclonedx-1-7-new-features-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cyclonedx-1-7-new-features-review</guid>
      <pubDate>Sun, 05 Apr 2026 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Why SLSA Level 3 Matters (and Level 4 Usually Doesn't)]]></title>
      <description><![CDATA[SLSA Level 3 gives you verifiable build provenance that satisfies CISA M-22-18 and EO 14028. Level 4 adds hermetic builds most teams will never need.]]></description>
      <link>https://safeguard.sh/resources/blog/why-slsa-level-3-matters-level-4-usually-doesnt</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/why-slsa-level-3-matters-level-4-usually-doesnt</guid>
      <pubDate>Sun, 05 Apr 2026 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Prompt Injection in RAG: Indirect Attacks]]></title>
      <description><![CDATA[A senior engineer's breakdown of indirect prompt injection in RAG pipelines, how real attacks land through retrieved content, and what actually reduces exposure.]]></description>
      <link>https://safeguard.sh/resources/blog/prompt-injection-rag-pipeline-indirect-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/prompt-injection-rag-pipeline-indirect-attacks</guid>
      <pubDate>Sun, 05 Apr 2026 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Real-World Deployment: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Demos live on a single repo and a curated dataset. Real deployments hit fifty repos, three CI providers, two cloud accounts, and an air-gapped environment. The gap is where vendors get sorted.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-real-world-deployment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-real-world-deployment</guid>
      <pubDate>Sat, 04 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Lazarus Financial Sector Campaigns 2024-2025]]></title>
      <description><![CDATA[Lazarus Group's 2024-2025 financial sector campaigns combined exchange compromises, DeFi exploits, and developer social engineering. Here is what defenders must know.]]></description>
      <link>https://safeguard.sh/resources/blog/lazarus-financial-sector-campaigns-2024-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lazarus-financial-sector-campaigns-2024-2025</guid>
      <pubDate>Sat, 04 Apr 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Buyer Guide: Software Supply Chain Security 2026]]></title>
      <description><![CDATA[A senior-engineer buyer guide for software supply chain security in 2026: what the categories mean, what to test, and what to ignore in vendor pitches.]]></description>
      <link>https://safeguard.sh/resources/blog/buyer-guide-software-supply-chain-security-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/buyer-guide-software-supply-chain-security-2026</guid>
      <pubDate>Sat, 04 Apr 2026 00:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Telemetry Data Governance]]></title>
      <description><![CDATA[MCP server telemetry captures sensitive prompts, arguments, and outputs. A governance framework for retention, redaction, and tenant-scoped access is essential.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-server-telemetry-data-governance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-server-telemetry-data-governance</guid>
      <pubDate>Thu, 02 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Provenance, Attestation, and Signing: A Practical Glossary]]></title>
      <description><![CDATA[Provenance describes how software was built, attestations are signed claims about that process, and signing proves origin. Here's how the pieces fit.]]></description>
      <link>https://safeguard.sh/resources/blog/provenance-attestation-signing-practical-glossary</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/provenance-attestation-signing-practical-glossary</guid>
      <pubDate>Thu, 02 Apr 2026 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Composer/PHP Supply Chain Threats: 2025 Report]]></title>
      <description><![CDATA[A senior engineer's 2025 report on Composer and Packagist supply chain threats: namespace abuse, abandoned maintainers, plugin hooks, and the attacks that actually landed on PHP shops.]]></description>
      <link>https://safeguard.sh/resources/blog/composer-php-supply-chain-threats-2025-report</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/composer-php-supply-chain-threats-2025-report</guid>
      <pubDate>Thu, 02 Apr 2026 09:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[California SB-327 IoT Security Enforcement Update]]></title>
      <description><![CDATA[A 2026 enforcement update on California SB-327, the IoT security statute that set a national precedent, and what manufacturers and integrators need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/california-sb-327-iot-security-enforcement-update</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/california-sb-327-iot-security-enforcement-update</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Griffin AI: Eval Benchmarks Published]]></title>
      <description><![CDATA[Griffin AI's evaluation harness results published for the first time. Benchmark methodology, comparison against baselines, and what the numbers mean for production use.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-griffin-ai-eval-benchmarks-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-griffin-ai-eval-benchmarks-2026</guid>
      <pubDate>Wed, 01 Apr 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[OpenAI API Key Leakage on GitHub at Scale]]></title>
      <description><![CDATA[A senior engineer's view of OpenAI API key leakage on GitHub at scale, why automated secret scanning misses so many, and what actually stops the bleeding.]]></description>
      <link>https://safeguard.sh/resources/blog/openai-api-key-leakage-on-github-at-scale</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openai-api-key-leakage-on-github-at-scale</guid>
      <pubDate>Wed, 01 Apr 2026 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Symbol Conflict and Binary Planting Attacks 2025]]></title>
      <description><![CDATA[Symbol conflicts and binary planting are the oldest native-code attacks, and they are showing up in modern software supply chains in unexpected places.]]></description>
      <link>https://safeguard.sh/resources/blog/symbol-conflict-malicious-binary-planting-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/symbol-conflict-malicious-binary-planting-2025</guid>
      <pubDate>Wed, 01 Apr 2026 09:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Q1 2026 Release Recap]]></title>
      <description><![CDATA[A quarterly recap of Q1 2026 at Safeguard.sh: the signed chain from source to runtime, self-healing GA, taint tracking, and the air-gap installer.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-changelog-q1-2026-recap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-changelog-q1-2026-recap</guid>
      <pubDate>Tue, 31 Mar 2026 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[White House M-22-18 SBOM Attestation Update]]></title>
      <description><![CDATA[OMB M-22-18 and the CISA Secure Software Self-Attestation form continue to evolve. Here is what producers and federal buyers must change in 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/white-house-memo-m-22-18-sbom-attestation-update</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/white-house-memo-m-22-18-sbom-attestation-update</guid>
      <pubDate>Tue, 31 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Best Secret Scanning Tools 2026 Comparison]]></title>
      <description><![CDATA[A senior-engineer view of secret-scanning tools worth running in 2026: what TruffleHog, Gitleaks, GitGuardian, and platform-native scanners actually do well.]]></description>
      <link>https://safeguard.sh/resources/blog/best-secret-scanning-tools-2026-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/best-secret-scanning-tools-2026-comparison</guid>
      <pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SLSA v1.1 Framework Update: What's New]]></title>
      <description><![CDATA[SLSA v1.1 sharpens the build track, adds a source track draft, and clarifies attestation semantics. Here is the practical guide for security teams.]]></description>
      <link>https://safeguard.sh/resources/blog/slsa-v1-1-framework-update-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/slsa-v1-1-framework-update-review</guid>
      <pubDate>Mon, 30 Mar 2026 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Container Image Supply Chain: From Dockerfile to Production]]></title>
      <description><![CDATA[Every container pulled in production is a trust decision. Here's how to secure the chain from base image selection through Dockerfile to admission control.]]></description>
      <link>https://safeguard.sh/resources/blog/container-image-supply-chain-dockerfile-to-production</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-image-supply-chain-dockerfile-to-production</guid>
      <pubDate>Mon, 30 Mar 2026 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Chrome Extension Cyberhaven Supply Chain Attack 2024]]></title>
      <description><![CDATA[A technical retrospective on the 2024 Cyberhaven Chrome extension compromise: the phishing chain, the malicious OAuth flow, the exfiltration payload, and what actually changes browser-extension supply chain defense.]]></description>
      <link>https://safeguard.sh/resources/blog/chrome-extension-cyberhaven-supply-chain-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chrome-extension-cyberhaven-supply-chain-2024</guid>
      <pubDate>Mon, 30 Mar 2026 09:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Reachability Analysis: Cutting Through CVE Noise to Find What Actually Matters]]></title>
      <description><![CDATA[Why most CVEs in your dependency tree are not exploitable in your application, and how reachability analysis separates real risk from noise.]]></description>
      <link>https://safeguard.sh/resources/blog/reachability-analysis-reducing-cve-noise</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/reachability-analysis-reducing-cve-noise</guid>
      <pubDate>Mon, 30 Mar 2026 09:00:00 GMT</pubDate>
      <category>Technical</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Top Software Supply Chain Security Predictions 2026]]></title>
      <description><![CDATA[A senior-engineer set of 2026 predictions for software supply chain security, grounded in current adoption curves, regulatory timelines, and attacker behavior.]]></description>
      <link>https://safeguard.sh/resources/blog/top-software-supply-chain-security-predictions-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/top-software-supply-chain-security-predictions-2026</guid>
      <pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Side-Channel Attacks 2025]]></title>
      <description><![CDATA[Side-channel attacks are moving from hardware into software supply chains, where build-time timing, error messages, and telemetry leak meaningful secrets.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-side-channel-attacks-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-side-channel-attacks-2025</guid>
      <pubDate>Sun, 29 Mar 2026 09:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Scaling Across Repos: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Multi-repo security reasoning is a graph problem, not a retrieval problem. How Griffin AI's engine scales where pure-LLM products flatten into guesswork.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-multi-repo-scale</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-multi-repo-scale</guid>
      <pubDate>Sat, 28 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Lifecycle Management Patterns]]></title>
      <description><![CDATA[Patterns for managing MCP servers through development, staging, rollout, and deprecation — with an eye on the security gaps that appear at each transition.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-server-lifecycle-management-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-server-lifecycle-management-patterns</guid>
      <pubDate>Sat, 28 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Fine-Tune Backdoor Insertion: Academic Research]]></title>
      <description><![CDATA[A senior engineer's review of academic research on fine-tune backdoor insertion, from BadNets to sleeper agents, and how the findings translate to production ML.]]></description>
      <link>https://safeguard.sh/resources/blog/fine-tune-backdoor-insertion-academic-research</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fine-tune-backdoor-insertion-academic-research</guid>
      <pubDate>Sat, 28 Mar 2026 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Flax Typhoon Residential Proxy Supply Chain 2024]]></title>
      <description><![CDATA[Flax Typhoon's Raptor Train botnet turned consumer IoT into a state-aligned proxy network. Here is the tradecraft, the takedown, and the supply chain lessons.]]></description>
      <link>https://safeguard.sh/resources/blog/flax-typhoon-residential-proxy-supply-chain-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/flax-typhoon-residential-proxy-supply-chain-2024</guid>
      <pubDate>Sat, 28 Mar 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Incident Response for Supply Chain Attacks: A 2026 Playbook]]></title>
      <description><![CDATA[A practical incident response playbook tailored for supply chain compromises — from initial detection through containment, eradication, and lessons learned.]]></description>
      <link>https://safeguard.sh/resources/blog/incident-response-supply-chain-playbook-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/incident-response-supply-chain-playbook-2026</guid>
      <pubDate>Sat, 28 Mar 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[How to Detect Dependency Confusion Attacks Before They Ship]]></title>
      <description><![CDATA[Dependency confusion still works in 2026 because teams keep missing the same three controls. Here's how to detect and block it in npm, pip, and Maven.]]></description>
      <link>https://safeguard.sh/resources/blog/detect-dependency-confusion-before-it-ships</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/detect-dependency-confusion-before-it-ships</guid>
      <pubDate>Fri, 27 Mar 2026 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[India DPDP Act Software Security Implications 2026]]></title>
      <description><![CDATA[A senior engineer's view of the Digital Personal Data Protection Act in 2026: security safeguards, significant data fiduciaries, breach notification, and software controls that actually comply.]]></description>
      <link>https://safeguard.sh/resources/blog/india-dpdp-act-software-security-implications-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/india-dpdp-act-software-security-implications-2026</guid>
      <pubDate>Thu, 26 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Reflection-Based Dependency Confusion Techniques]]></title>
      <description><![CDATA[Dependency confusion is moving beyond name-typosquat. Reflection-based techniques let attackers hijack packages through dynamic imports and runtime resolution.]]></description>
      <link>https://safeguard.sh/resources/blog/reflection-based-dependency-confusion-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/reflection-based-dependency-confusion-techniques</guid>
      <pubDate>Thu, 26 Mar 2026 09:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Okta Cross-Tenant Impersonation 2024]]></title>
      <description><![CDATA[Okta's cross-tenant impersonation advisory and related social-engineering campaigns exposed how identity providers get targeted. Lessons for defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/okta-cross-tenant-impersonation-incident-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/okta-cross-tenant-impersonation-incident-2024</guid>
      <pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[State of Open Source Funding and Security 2026]]></title>
      <description><![CDATA[How open source funding flows connect to security outcomes in 2026: maintainer capacity, critical project support, and the patterns that reduce risk.]]></description>
      <link>https://safeguard.sh/resources/blog/state-of-open-source-funding-and-security-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-of-open-source-funding-and-security-2026</guid>
      <pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Sandbox Escapes: Threat Model]]></title>
      <description><![CDATA[A threat model for sandbox escapes in Model Context Protocol servers, mapping attack surfaces from tool execution environments to host processes and shared state.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-server-sandbox-escapes-threat-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-server-sandbox-escapes-threat-model</guid>
      <pubDate>Wed, 25 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Training Data Poisoning: Pipeline Defenses]]></title>
      <description><![CDATA[A senior engineer's guide to training data poisoning defenses in 2026, from split-learning detection to provenance attestation and continuous pipeline monitoring.]]></description>
      <link>https://safeguard.sh/resources/blog/data-poisoning-training-pipeline-defenses</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/data-poisoning-training-pipeline-defenses</guid>
      <pubDate>Wed, 25 Mar 2026 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Introducing the Safeguard Marketplace: Extend Your Supply Chain Security]]></title>
      <description><![CDATA[The Safeguard Marketplace brings community-built integrations, policy templates, and compliance packs to the platform.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-marketplace-launch</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-marketplace-launch</guid>
      <pubDate>Wed, 25 Mar 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Tool-Call Hijacking: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A hijacked tool call is more consequential than a hijacked response. The defence requires the tool layer to police the model, not the other way around.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-tool-call-hijacking-defences</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-tool-call-hijacking-defences</guid>
      <pubDate>Tue, 24 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Sourcegraph Cody for Security Use]]></title>
      <description><![CDATA[Cody's codebase-wide context is valuable for security review. Griffin AI adds reachability, taint, and policy grounding that Cody doesn't target.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-sourcegraph-cody-security-use</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-sourcegraph-cody-security-use</guid>
      <pubDate>Tue, 24 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How to Secure AI Agents on the MCP Protocol]]></title>
      <description><![CDATA[MCP gives AI agents real tools, real credentials, and real blast radius. Here is a hardening guide for running MCP servers in production without torching your environment.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-secure-ai-agents-mcp-protocol-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-secure-ai-agents-mcp-protocol-2026</guid>
      <pubDate>Tue, 24 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Zero Trust for CI/CD Pipelines: A Concrete Blueprint]]></title>
      <description><![CDATA[CI/CD runners are a top attacker target. Here's a concrete zero-trust blueprint using OIDC federation, pinned action SHAs, and short-lived identities.]]></description>
      <link>https://safeguard.sh/resources/blog/zero-trust-cicd-pipelines-blueprint</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zero-trust-cicd-pipelines-blueprint</guid>
      <pubDate>Tue, 24 Mar 2026 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[UK PSTI Act Consumer IoT: Year-One Review]]></title>
      <description><![CDATA[The UK PSTI Act's first year of enforcement reveals how consumer IoT vendors are struggling with minimum security requirements, password rules, and disclosure policies.]]></description>
      <link>https://safeguard.sh/resources/blog/uk-psti-act-consumer-iot-year-one-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/uk-psti-act-consumer-iot-year-one-review</guid>
      <pubDate>Tue, 24 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise AI Center Of Excellence Blueprint]]></title>
      <description><![CDATA[An AI Center of Excellence is not a committee. It is the function that makes AI adoption coherent across business units. The blueprint is specific.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-ai-center-of-excellence-blueprint</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-ai-center-of-excellence-blueprint</guid>
      <pubDate>Mon, 23 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[ROI Timeline: Griffin AI vs Mythos]]></title>
      <description><![CDATA[The honest answer to &quot;when does this pay back?&quot; is where sales decks and procurement reality diverge. Griffin AI and Mythos-class tools have different ROI shapes.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-roi-timeline</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-roi-timeline</guid>
      <pubDate>Mon, 23 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Open Weights: Supply Chain Risks]]></title>
      <description><![CDATA[Open-weight models give you total deployment control. They also give you a new supply chain to secure. The tradeoff is worth being explicit about.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-open-weight-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-open-weight-supply-chain-risks</guid>
      <pubDate>Mon, 23 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[npm Garbage Collection Abuse: Attack Research]]></title>
      <description><![CDATA[npm's unpublish and tarball retention rules create a narrow but real window for attackers to reclaim deleted names and swap tarball contents. Here is the 2025 research.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-garbage-collection-abuse-attack-research</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-garbage-collection-abuse-attack-research</guid>
      <pubDate>Mon, 23 Mar 2026 09:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Scaffold Prompts: Enterprise Governance]]></title>
      <description><![CDATA[System prompts that scaffold AI assistants are now load-bearing enterprise assets. A framework for versioning, reviewing, and governing them as seriously as source code.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-scaffold-prompts-enterprise-governance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-scaffold-prompts-enterprise-governance</guid>
      <pubDate>Sun, 22 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Regression Gate Design Patterns For Security LLMs]]></title>
      <description><![CDATA[A release gate that fails on regression is the most important operational control for AI-for-security tools. The design patterns are specific and worth copying.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-regression-gate-design-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-regression-gate-design-patterns</guid>
      <pubDate>Sun, 22 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Claude Citations: Advisory Work]]></title>
      <description><![CDATA[Claude's citations feature makes the model say where its claims come from. Griffin AI uses it for advisory workflows where traceability is the entire point.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-claude-citations-for-advisory-work</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-claude-citations-for-advisory-work</guid>
      <pubDate>Sun, 22 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[FDA Premarket Cybersecurity for Medical Devices 2026]]></title>
      <description><![CDATA[A senior engineer's guide to FDA premarket cybersecurity for medical devices in 2026: section 524B, SBOM expectations, SPDF, and what reviewers actually ask about.]]></description>
      <link>https://safeguard.sh/resources/blog/fda-premarket-cybersecurity-medical-devices-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fda-premarket-cybersecurity-medical-devices-2026</guid>
      <pubDate>Sun, 22 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Introducing Safeguard TPRM: Evidence-Based Third-Party Risk Management]]></title>
      <description><![CDATA[Safeguard's new TPRM module replaces vendor questionnaires with SBOM-driven, continuous third-party risk assessment.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-tprm-module-release</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-tprm-module-release</guid>
      <pubDate>Sun, 22 Mar 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[State of DevSecOps 2026: What Teams Actually Ship]]></title>
      <description><![CDATA[A senior-engineer review of DevSecOps in 2026: what teams ship in production, which controls moved the needle, and where most programs still stall.]]></description>
      <link>https://safeguard.sh/resources/blog/state-of-devsecops-2026-what-teams-ship</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-of-devsecops-2026-what-teams-ship</guid>
      <pubDate>Sun, 22 Mar 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs OpenAI Pricing: Security Workloads]]></title>
      <description><![CDATA[Per-token pricing on the OpenAI API looks cheap on a single call and expensive on a year-long security workload. Griffin AI's pricing reflects the architecture.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-openai-pricing-for-security-workloads</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-openai-pricing-for-security-workloads</guid>
      <pubDate>Sat, 21 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Small Language Models: Security Use-Case Fit]]></title>
      <description><![CDATA[Small language models aren&apos;t a worse version of large ones. For specific security workflows, they&apos;re the right tool — if you know which workflows.]]></description>
      <link>https://safeguard.sh/resources/blog/small-language-model-security-usecase-fit</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/small-language-model-security-usecase-fit</guid>
      <pubDate>Sat, 21 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Funding Crisis: What It Means for Your Tree]]></title>
      <description><![CDATA[Critical infrastructure depends on unpaid maintainers, and burnout creates openings attackers exploit. xz-utils was the warning shot, not the exception.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-funding-crisis-dependency-tree-impact</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-funding-crisis-dependency-tree-impact</guid>
      <pubDate>Sat, 21 Mar 2026 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Claude MCP Tool Poisoning Threat Model 2026]]></title>
      <description><![CDATA[A senior engineer's threat model for Claude MCP tool poisoning in 2026, covering malicious servers, description hijacking, and the authorization patterns that actually help.]]></description>
      <link>https://safeguard.sh/resources/blog/claude-mcp-tool-poisoning-threat-model-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/claude-mcp-tool-poisoning-threat-model-2026</guid>
      <pubDate>Sat, 21 Mar 2026 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Developer Social Engineering Campaigns 2024-2025]]></title>
      <description><![CDATA[State-aligned and financially motivated actors now target individual developers with bespoke social engineering. Here is the tradecraft and what engineering leaders must do.]]></description>
      <link>https://safeguard.sh/resources/blog/dev-0270-developer-social-engineering-campaign</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dev-0270-developer-social-engineering-campaign</guid>
      <pubDate>Sat, 21 Mar 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Hugging Face Token Exposure 2024 Analysis]]></title>
      <description><![CDATA[Researchers found thousands of valid Hugging Face API tokens in public code and models. Analysis of the 2024 exposures and what they mean for ML supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/hugging-face-token-exposure-2024-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/hugging-face-token-exposure-2024-analysis</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AWS re:Inforce 2026 Supply Chain Sessions: Field Notes]]></title>
      <description><![CDATA[Field notes from AWS re:Inforce 2026 supply chain track: signing at scale, SBOM adoption, and the Inspector and ECR updates that actually matter.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-reinforce-2026-supply-chain-sessions</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-reinforce-2026-supply-chain-sessions</guid>
      <pubDate>Fri, 20 Mar 2026 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Fine-Tune Drift Measured On Eval Sets]]></title>
      <description><![CDATA[Fine-tuning to improve one task frequently regresses others. Without eval harnesses, the regressions ship. The measurable drift is larger than vendors admit.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-fine-tune-drift-on-evals</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-fine-tune-drift-on-evals</guid>
      <pubDate>Fri, 20 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemini On-Device: Developer Tools]]></title>
      <description><![CDATA[Gemini on-device models are fast and cheap. For the developer-tool layer, they're useful. For the engine-plus-LLM layer, on-device is not the right fit.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-on-device-for-developer-tools</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-on-device-for-developer-tools</guid>
      <pubDate>Fri, 20 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Grounded Reasoning vs Hallucinated: Griffin AI vs Mythos]]></title>
      <description><![CDATA[The difference between grounded reasoning and hallucinated reasoning is not eloquence — it's citation. A look at how Griffin AI anchors every claim.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-reasoning-grounded-vs-hallucinated</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-reasoning-grounded-vs-hallucinated</guid>
      <pubDate>Fri, 20 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[DevSecOps and Platform Engineering: The Convergence No One Expected]]></title>
      <description><![CDATA[Platform engineering teams are becoming the new home for security controls. Here's why that is both promising and risky.]]></description>
      <link>https://safeguard.sh/resources/blog/devsecops-platform-engineering-convergence</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/devsecops-platform-engineering-convergence</guid>
      <pubDate>Fri, 20 Mar 2026 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How to Implement SLSA Level 3 Practically]]></title>
      <description><![CDATA[SLSA Level 3 requires hardened builds, verifiable provenance, and isolated build environments. Here is the practical path, not the theoretical one.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-implement-slsa-level-3-practical-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-implement-slsa-level-3-practical-guide</guid>
      <pubDate>Fri, 20 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[DNS Cache Poisoning for Software Updates: 2025]]></title>
      <description><![CDATA[DNS cache poisoning is a known attack class with a new application: hijacking software update checks to ship malicious binaries that pass every signature check.]]></description>
      <link>https://safeguard.sh/resources/blog/loophole-dns-cache-poisoning-software-updates-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/loophole-dns-cache-poisoning-software-updates-2025</guid>
      <pubDate>Fri, 20 Mar 2026 09:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Guardrail Consolidation: Market Dynamics 2026]]></title>
      <description><![CDATA[Two dozen AI guardrail vendors in 2023. A much smaller set in 2026. The consolidation has pattern — integrated platforms beat standalone guardrails.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-guardrail-consolidation-market</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-guardrail-consolidation-market</guid>
      <pubDate>Thu, 19 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Breaking Change Awareness: Griffin AI vs Mythos]]></title>
      <description><![CDATA[An auto-fix that closes a vulnerability and breaks the build is not a fix. Breaking-change awareness separates auto-PRs that ship from auto-PRs that get reverted.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-breaking-change-awareness</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-breaking-change-awareness</guid>
      <pubDate>Thu, 19 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Best Container Image Scanners 2026]]></title>
      <description><![CDATA[A fact-based review of the best container image scanners in 2026, comparing Trivy, Grype, Snyk, Prisma Cloud, and Safeguard.sh on accuracy and noise.]]></description>
      <link>https://safeguard.sh/resources/blog/best-container-image-scanners-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/best-container-image-scanners-2026</guid>
      <pubDate>Thu, 19 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Trusted Publishing Token Leaks in 2025]]></title>
      <description><![CDATA[Trusted Publishing made PyPI safer, but leaked short-lived OIDC tokens in CI logs kicked off a credential-replay campaign that PyPI, GitHub, and Sonatype all tracked in 2025.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-trusted-publishing-token-leak-campaign-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-trusted-publishing-token-leak-campaign-2025</guid>
      <pubDate>Thu, 19 Mar 2026 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[EU AI Act: Software Supply Chain Implications 2026]]></title>
      <description><![CDATA[The EU AI Act's 2026 obligations reshape software supply chain requirements for AI system providers, deployers, and upstream model suppliers across every sector.]]></description>
      <link>https://safeguard.sh/resources/blog/eu-ai-act-software-supply-chain-implications-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eu-ai-act-software-supply-chain-implications-2026</guid>
      <pubDate>Thu, 19 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Audit Trail Quality: Griffin AI vs Mythos]]></title>
      <description><![CDATA[An audit trail is only useful if you can answer questions from it. Quality is not about volume — it&apos;s about the ability to reconstruct decisions after the fact.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-audit-trail-quality</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-audit-trail-quality</guid>
      <pubDate>Wed, 18 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Sanitizer Detection: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A vulnerability that passes through a working sanitizer is not a vulnerability. Detecting that sanitizer accurately is the difference between actionable findings and noise.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-sanitizer-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-sanitizer-detection</guid>
      <pubDate>Wed, 18 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GenAI Code Assistants and Package Hallucination: 2026 Update]]></title>
      <description><![CDATA[LLM-suggested package names that do not exist are a registered attack vector in 2026. Here is where hallucination rates sit today and how to contain them.]]></description>
      <link>https://safeguard.sh/resources/blog/genai-package-hallucination-2026-update</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/genai-package-hallucination-2026-update</guid>
      <pubDate>Wed, 18 Mar 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Bill of Materials (ML-BOM) Standards in 2026]]></title>
      <description><![CDATA[A senior engineer's survey of AI-BOM and ML-BOM standards in 2026, from CycloneDX ML components to SPDX 3.0 AI profile, and what to actually ship.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-bill-of-materials-ml-bom-standards-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-bill-of-materials-ml-bom-standards-2026</guid>
      <pubDate>Wed, 18 Mar 2026 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Continuous Compliance Monitoring: A Practical Guide for Security Teams]]></title>
      <description><![CDATA[How to replace periodic compliance audits with continuous, automated monitoring that catches drift before auditors do.]]></description>
      <link>https://safeguard.sh/resources/blog/continuous-compliance-monitoring-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/continuous-compliance-monitoring-guide</guid>
      <pubDate>Wed, 18 Mar 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[DORA Third-Party ICT Risk for Financial Services 2026]]></title>
      <description><![CDATA[A senior engineer's view of DORA third-party ICT risk in 2026: register of information, concentration risk, subcontractor depth, and the operational controls regulators actually test.]]></description>
      <link>https://safeguard.sh/resources/blog/dora-financial-services-third-party-ict-risk-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dora-financial-services-third-party-ict-risk-2026</guid>
      <pubDate>Wed, 18 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[State of CVE Disclosure and KEV in 2026]]></title>
      <description><![CDATA[A senior-analyst view of CVE disclosure, KEV catalog growth, and the operational patterns that keep pace with them in 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/state-of-cve-disclosure-and-kev-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-of-cve-disclosure-and-kev-2026</guid>
      <pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cross-Vendor SBOM Normalization: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Your SBOMs come from a dozen vendors, three scanners, and two CI systems. Normalising them into one queryable graph is where SBOM programs actually succeed or fail.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cross-vendor-sbom-normalization</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cross-vendor-sbom-normalization</guid>
      <pubDate>Tue, 17 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How to Scan Docker Images for Vulnerabilities]]></title>
      <description><![CDATA[A production-grade vulnerability scanning pipeline for Docker images using Trivy and Grype, with reachability-based prioritization and admission enforcement.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-scan-docker-images-vulnerabilities-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-scan-docker-images-vulnerabilities-guide</guid>
      <pubDate>Tue, 17 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Actions Cache Poisoning Attack Class 2025]]></title>
      <description><![CDATA[GitHub Actions caches were never designed as a trust boundary. In 2025 researchers turned that mismatch into a repeatable supply-chain attack pattern.]]></description>
      <link>https://safeguard.sh/resources/blog/github-actions-cache-poisoning-attack-class-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-actions-cache-poisoning-attack-class-2025</guid>
      <pubDate>Tue, 17 Mar 2026 09:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NIST SP 800-161 Rev. 2 Third-Party Risk 2026]]></title>
      <description><![CDATA[NIST SP 800-161 Rev. 2 reshapes cyber supply chain risk management for federal contractors and commercial buyers. Here is what engineers must operationalize.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-sp-800-161-revision-2-third-party-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-sp-800-161-revision-2-third-party-2026</guid>
      <pubDate>Tue, 17 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Docker Hub Exposed Secrets at Scale 2024]]></title>
      <description><![CDATA[Researchers keep finding valid AWS, GitHub, and cloud credentials baked into public Docker Hub images. What the 2024 data shows and how to stop shipping secrets.]]></description>
      <link>https://safeguard.sh/resources/blog/docker-hub-exposed-secrets-at-scale-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/docker-hub-exposed-secrets-at-scale-2024</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Benchmark Reproducibility: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A benchmark you can&apos;t reproduce is marketing. A benchmark you can rerun on your own infrastructure is evidence. The reproducibility gap is wide.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-benchmark-reproducibility</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-benchmark-reproducibility</guid>
      <pubDate>Mon, 16 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Prompt Injection Defences: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Prompt injection is the defining AI security problem of this generation. The defences are structural, not cosmetic — and the architectural choices show.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-prompt-injection-defences</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-prompt-injection-defences</guid>
      <pubDate>Mon, 16 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Windsurf Cascade for Security Review]]></title>
      <description><![CDATA[Windsurf's Cascade agent is among the more capable in-editor agents. For security review specifically, it's a complement to Griffin AI, not a replacement.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-windsurf-cascade-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-windsurf-cascade-security-review</guid>
      <pubDate>Mon, 16 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Security for Aerospace & Defense (DoD) 2026]]></title>
      <description><![CDATA[Supply chain security for aerospace and defense contractors in 2026 means CMMC 2.0 final rule, DFARS 7012/7020/7021, and NIST 800-171 Rev 3 in production.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-aerospace-defense-dod-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-aerospace-defense-dod-2026</guid>
      <pubDate>Mon, 16 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise AI Metric Design For Executive Reporting]]></title>
      <description><![CDATA[AI-for-security metrics that show up on board slides are different from the ones engineers use day-to-day. Designing both sets properly is the work.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-ai-metric-design-for-executive-reporting</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-ai-metric-design-for-executive-reporting</guid>
      <pubDate>Sun, 15 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Self-Hosted Llama: Real Costs]]></title>
      <description><![CDATA[Self-hosting Llama looks cheap on paper. The real costs — GPUs, operations, engineering — make the comparison less obvious than the list price suggests.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-llama-vs-self-hosting-costs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-llama-vs-self-hosting-costs</guid>
      <pubDate>Sun, 15 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Pricing Predictability: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A 40% cost surprise in year two is not a pricing issue — it is an architecture issue. Griffin AI and Mythos-class tools diverge on predictability in structural ways.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-pricing-predictability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-pricing-predictability</guid>
      <pubDate>Sun, 15 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[MCP Client-Side Security Considerations]]></title>
      <description><![CDATA[The MCP client surface is often overlooked. We examine trust boundaries, schema handling, credential storage, and safe defaults for the agent side of the protocol.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-client-side-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-client-side-security-considerations</guid>
      <pubDate>Sun, 15 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Best SBOM Management Platforms 2026 Review]]></title>
      <description><![CDATA[A 2026 review of the best SBOM management platforms, comparing Dependency-Track, Anchore, Lineaje, Kusari, and Safeguard.sh on depth and compliance.]]></description>
      <link>https://safeguard.sh/resources/blog/best-sbom-management-platforms-2026-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/best-sbom-management-platforms-2026-review</guid>
      <pubDate>Sun, 15 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CrowdStrike Falcon Outage: Post-Mortem Lessons]]></title>
      <description><![CDATA[The CrowdStrike Falcon outage of July 2024 bricked 8.5 million Windows hosts. A content validator bug and no staged rollout were the confirmed root cause.]]></description>
      <link>https://safeguard.sh/resources/blog/crowdstrike-falcon-outage-post-mortem-lessons</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/crowdstrike-falcon-outage-post-mortem-lessons</guid>
      <pubDate>Sun, 15 Mar 2026 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FedRAMP 20x and Continuous Compliance for Software Vendors]]></title>
      <description><![CDATA[FedRAMP 20x replaces document-heavy review with machine-verifiable assertions. SBOMs and runtime evidence become first-class authorization artifacts.]]></description>
      <link>https://safeguard.sh/resources/blog/fedramp-20x-continuous-compliance-software-vendors</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fedramp-20x-continuous-compliance-software-vendors</guid>
      <pubDate>Sun, 15 Mar 2026 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs in Healthcare: Patient Safety Meets Software Transparency]]></title>
      <description><![CDATA[Healthcare organizations face unique SBOM challenges driven by FDA requirements, device lifecycles, and patient safety stakes.]]></description>
      <link>https://safeguard.sh/resources/blog/software-bill-of-materials-healthcare</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-bill-of-materials-healthcare</guid>
      <pubDate>Sun, 15 Mar 2026 10:00:00 GMT</pubDate>
      <category>Healthcare</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Confused Deputy Attacks on CI/CD Service Accounts]]></title>
      <description><![CDATA[Build systems hold broad trust and tight deadlines, which makes them perfect confused deputies. Here is how the attack pattern shows up in modern CI/CD and how to defang it.]]></description>
      <link>https://safeguard.sh/resources/blog/confused-deputy-attacks-ci-cd-service-accounts</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/confused-deputy-attacks-ci-cd-service-accounts</guid>
      <pubDate>Sun, 15 Mar 2026 09:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Complete SBOM Compliance Guide for 2026]]></title>
      <description><![CDATA[Everything you need to know about SBOM requirements under EO 14028, NIST SSDF, and emerging global regulations.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-compliance-guide-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-compliance-guide-2026</guid>
      <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Safeguard Team)</author>
    </item>
    <item>
      <title><![CDATA[AI Coding Assistant Data Leakage Paths]]></title>
      <description><![CDATA[AI coding assistants promise productivity but expand the data leakage surface in specific, mappable ways. The paths, the mitigations, and what enterprise policy actually looks like.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-coding-assistant-data-leakage-paths</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-coding-assistant-data-leakage-paths</guid>
      <pubDate>Sat, 14 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Real-World Vs Synthetic Eval Gap In Security]]></title>
      <description><![CDATA[Synthetic eval benchmarks are controllable. Real-world data is messy. The gap between performance on each is usually large, and vendors prefer one over the other for a reason.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-real-world-vs-synthetic-eval-gap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-real-world-vs-synthetic-eval-gap</guid>
      <pubDate>Sat, 14 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Claude Computer Use: Security]]></title>
      <description><![CDATA[Claude's Computer Use lets an agent drive a GUI. For security, this is powerful and dangerous in equal measure. The architecture around it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-claude-computer-use-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-claude-computer-use-for-security</guid>
      <pubDate>Sat, 14 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cryptography Misuse Detection: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Crypto misuse is not about broken algorithms. It is about misused parameters, missing checks, and the gap between &quot;it compiles&quot; and &quot;it is secure.&quot;]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cryptography-misuse-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cryptography-misuse-detection</guid>
      <pubDate>Sat, 14 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AI Agent Tool Confused Deputy Problem in 2026]]></title>
      <description><![CDATA[A senior engineer's take on the confused deputy problem in AI agent tool use, why it keeps reappearing in 2026, and the architectural patterns that actually fix it.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-agent-tool-confused-deputy-problem-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-agent-tool-confused-deputy-problem-2026</guid>
      <pubDate>Sat, 14 Mar 2026 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[APT29 Cloud Supply Chain Tradecraft 2025]]></title>
      <description><![CDATA[APT29's 2024-2025 cloud-native tradecraft — from Midnight Blizzard's Microsoft intrusion to the Teams phishing pivots — shows how SVR targets identity as supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/apt29-cloud-supply-chain-tradecraft-update-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apt29-cloud-supply-chain-tradecraft-update-2025</guid>
      <pubDate>Sat, 14 Mar 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CMMC Level 3 Software Supply Chain Checklist 2026]]></title>
      <description><![CDATA[A senior engineer's CMMC Level 3 checklist focused on software supply chain: SBOM, SC-SR controls, SSP evidence, and the operational gaps most defense contractors still have.]]></description>
      <link>https://safeguard.sh/resources/blog/cmmc-level-3-software-supply-chain-checklist-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cmmc-level-3-software-supply-chain-checklist-2026</guid>
      <pubDate>Sat, 14 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2024-4367 PDF.js Arbitrary Code Execution]]></title>
      <description><![CDATA[CVE-2024-4367 is a PDF.js code-execution flaw via font handling that affects Firefox, Thunderbird, and every embedder. Root cause and remediation.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-4367-pdfjs-arbitrary-code-execution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-4367-pdfjs-arbitrary-code-execution</guid>
      <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[State of Container Security 2026: Survey Summary]]></title>
      <description><![CDATA[A survey-style summary of container security in 2026: what production teams actually ship, where image security stands, and which runtime controls moved the needle.]]></description>
      <link>https://safeguard.sh/resources/blog/state-of-container-security-2026-survey-summary</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-of-container-security-2026-survey-summary</guid>
      <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Ensemble LLMs For High-Precision Security Findings]]></title>
      <description><![CDATA[One model&apos;s confident answer is a guess. Multiple models agreeing is evidence. Ensemble approaches raise precision for security-critical findings.]]></description>
      <link>https://safeguard.sh/resources/blog/ensemble-llm-for-high-precision-security-findings</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ensemble-llm-for-high-precision-security-findings</guid>
      <pubDate>Fri, 13 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs GPT-5: Compliance Posture]]></title>
      <description><![CDATA[Compliance posture is about what you can prove, not what you can do. GPT-5 has impressive capabilities; Griffin AI is engineered to be defensible.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-5-compliance-posture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-5-compliance-posture</guid>
      <pubDate>Fri, 13 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How to Prevent Dependency Confusion in npm (2026)]]></title>
      <description><![CDATA[Dependency confusion attacks are still landing in 2026 because scoped packages, registry config, and provenance checks are misconfigured by default. Here is the fix.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-prevent-dependency-confusion-npm-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-prevent-dependency-confusion-npm-2026</guid>
      <pubDate>Fri, 13 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Local Runner: Agentic Security on Your Laptop]]></title>
      <description><![CDATA[The Local Runner is a command-line agent that runs Safeguard workflows against your working tree. Think claude-code-for-security, but for supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-local-runner-release-agentic-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-local-runner-release-agentic-security</guid>
      <pubDate>Fri, 13 Mar 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[UNC5221 Ivanti Exploitation Campaign Analysis]]></title>
      <description><![CDATA[UNC5221 chained Ivanti Connect Secure zero-days through 2024 and 2025. The campaign reads like a masterclass in living off trusted edge appliances.]]></description>
      <link>https://safeguard.sh/resources/blog/unc5221-ivanti-exploitation-campaign-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/unc5221-ivanti-exploitation-campaign-analysis</guid>
      <pubDate>Fri, 13 Mar 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Hallucinated Security Findings: Measurable Rates]]></title>
      <description><![CDATA[Pure-LLM security analysis hallucinates findings at rates between 20% and 70% depending on the task and model. Grounding is the architectural answer.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-hallucinated-security-findings</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-hallucinated-security-findings</guid>
      <pubDate>Thu, 12 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemini for FedRAMP Workflows]]></title>
      <description><![CDATA[Gemini has FedRAMP-authorised deployment options. Griffin AI builds on FedRAMP-aligned infrastructure. The comparison is about what the customer has to build.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-compliance-fedramp</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-compliance-fedramp</guid>
      <pubDate>Thu, 12 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[False Positive Rates: Griffin AI vs Mythos Benchmarked]]></title>
      <description><![CDATA[Why pure-LLM security products generate false positives that engine-grounded platforms like Griffin AI structurally cannot — with CWEs and real triage data.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-false-positive-rates</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-false-positive-rates</guid>
      <pubDate>Thu, 12 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Support Model: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Support tier comparisons look identical on paper. The real difference shows up at 2am during an incident, and the shape of that difference is worth understanding before signing.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-support-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-support-model</guid>
      <pubDate>Thu, 12 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Best SCA Tools for Enterprise: 2026 Comparison]]></title>
      <description><![CDATA[A fact-based 2026 review of the best Software Composition Analysis tools for enterprise teams, covering depth, reachability, remediation, and compliance.]]></description>
      <link>https://safeguard.sh/resources/blog/best-sca-tools-enterprise-2026-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/best-sca-tools-enterprise-2026-comparison</guid>
      <pubDate>Thu, 12 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE Triage Is Broken. Here's a Better Workflow.]]></title>
      <description><![CDATA[Most enterprise CVE queues are noise. KEV plus EPSS plus reachability plus policy-as-code cuts the real actionable list to a manageable few percent.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-triage-is-broken-better-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-triage-is-broken-better-workflow</guid>
      <pubDate>Thu, 12 Mar 2026 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[tj-actions Compromise: One Year Retrospective]]></title>
      <description><![CDATA[A year after the tj-actions/changed-files compromise leaked CI secrets across thousands of GitHub repos, what did we fix and what is still dangerously convenient?]]></description>
      <link>https://safeguard.sh/resources/blog/tj-actions-compromise-one-year-retrospective</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/tj-actions-compromise-one-year-retrospective</guid>
      <pubDate>Thu, 12 Mar 2026 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Security for Energy (NERC CIP) 2026]]></title>
      <description><![CDATA[Supply chain security for energy utilities in 2026 means CIP-013-2, CIP-010-4 software integrity, and the CIP-015-1 internal network monitoring rollout.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-energy-nerc-cip-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-energy-nerc-cip-2026</guid>
      <pubDate>Thu, 12 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Automating Third-Party Risk Assessment: Moving Beyond Spreadsheets and Questionnaires]]></title>
      <description><![CDATA[Why manual vendor risk assessments are failing, and how automation is reshaping third-party risk management for software supply chains.]]></description>
      <link>https://safeguard.sh/resources/blog/third-party-risk-assessment-automation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/third-party-risk-assessment-automation</guid>
      <pubDate>Thu, 12 Mar 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2025-24071 Windows Explorer NTLM Hash Leak]]></title>
      <description><![CDATA[A .library-ms file extracted from a zip archive can leak NTLM hashes without the user opening anything. Breakdown of CVE-2025-24071 and the defensive response.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2025-24071-windows-explorer-ntlm-leak</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2025-24071-windows-explorer-ntlm-leak</guid>
      <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Fine-Tune Backdoors: The Quiet Threat]]></title>
      <description><![CDATA[Fine-tuning a model on an attacker-controlled dataset can implant behaviour that only activates under specific conditions. The threat is quiet because detection is hard.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-fine-tune-backdoors</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-fine-tune-backdoors</guid>
      <pubDate>Wed, 11 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Rollback Safety: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Sometimes a remediation has to be reverted. Griffin AI's minimal, grounded patches roll back cleanly; Mythos-class patches often do not.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-rollback-safety</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-rollback-safety</guid>
      <pubDate>Wed, 11 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Storm-0558 Microsoft Cloud Identity Aftermath]]></title>
      <description><![CDATA[Storm-0558 forged Microsoft cloud tokens with a stolen MSA key and read government email. Three years later the architectural lessons are still unevenly applied.]]></description>
      <link>https://safeguard.sh/resources/blog/storm-0558-microsoft-cloud-identity-aftermath</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/storm-0558-microsoft-cloud-identity-aftermath</guid>
      <pubDate>Wed, 11 Mar 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[VS Code Marketplace Malware Campaigns in 2025]]></title>
      <description><![CDATA[A senior engineer's review of the 2025 VS Code Marketplace malware wave, including typosquats, trojanized themes, and extensions that stole npm tokens at scale.]]></description>
      <link>https://safeguard.sh/resources/blog/vscode-extension-marketplace-malware-campaigns-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vscode-extension-marketplace-malware-campaigns-2025</guid>
      <pubDate>Wed, 11 Mar 2026 09:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CMMC Pass-Through: Griffin AI vs Mythos]]></title>
      <description><![CDATA[CMMC 2.0 rollout has made flow-down expectations concrete. AI-for-security tools used by DIB contractors are in scope, and the pass-through story matters.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cmmc-pass-through</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cmmc-pass-through</guid>
      <pubDate>Tue, 10 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Transitive Depth: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Most scanners stop at five or six levels of transitive depth. Real production graphs run sixty levels deep, and the most interesting vulnerabilities live in the long tail.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-transitive-depth-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-transitive-depth-comparison</guid>
      <pubDate>Tue, 10 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Executive Order 14028 at Five Years: A Comprehensive Review]]></title>
      <description><![CDATA[Five years after President Biden signed EO 14028, we assess what it accomplished, what it missed, and what comes next.]]></description>
      <link>https://safeguard.sh/resources/blog/eo-14028-five-years-comprehensive-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eo-14028-five-years-comprehensive-review</guid>
      <pubDate>Tue, 10 Mar 2026 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[How to Sign Container Images with Cosign in Production]]></title>
      <description><![CDATA[Keyless Cosign signing with Fulcio and Rekor is the 2026 default. Here is the production workflow, policy configuration, and the failure modes nobody warns you about.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-sign-container-images-cosign-production</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-sign-container-images-cosign-production</guid>
      <pubDate>Tue, 10 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard March 2026 Release Notes]]></title>
      <description><![CDATA[March 2026 at Safeguard.sh: Griffin taint tracking, Eagle SBOM-driven advisories, Lino cross-service baselines, and the new runner air-gap installer.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-changelog-march-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-changelog-march-2026</guid>
      <pubDate>Tue, 10 Mar 2026 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FTC and Software Supply Chain Enforcement 2026]]></title>
      <description><![CDATA[The FTC's widening enforcement posture after the MGM breach and related consent orders is reshaping software supply chain accountability for vendors and buyers.]]></description>
      <link>https://safeguard.sh/resources/blog/ftc-mgm-breach-settlement-software-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ftc-mgm-breach-settlement-software-implications</guid>
      <pubDate>Tue, 10 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How to Rotate Leaked Secrets With Automation (2026)]]></title>
      <description><![CDATA[The 2026 playbook for automated secret rotation: detection pipelines, credential broker patterns, blast-radius analysis, and CI integration that actually holds up in production.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-rotate-leaked-secrets-automation-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-rotate-leaked-secrets-automation-2026</guid>
      <pubDate>Tue, 10 Mar 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2024-29849 Veeam Auth Bypass Analysis]]></title>
      <description><![CDATA[CVE-2024-29849 is a CVSS 9.8 auth bypass in Veeam Backup Enterprise Manager. Root cause, exploitation, detection, and patching guidance.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-29849-veeam-auth-bypass-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-29849-veeam-auth-bypass-analysis</guid>
      <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[State of AI Security in Enterprise 2026]]></title>
      <description><![CDATA[Where enterprise AI security actually stands in 2026: model supply chain risks, agent threats, governance gaps, and the controls that measurably reduce exposure.]]></description>
      <link>https://safeguard.sh/resources/blog/state-of-ai-security-in-enterprise-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-of-ai-security-in-enterprise-2026</guid>
      <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Training Data Provenance: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Training data is a supply chain component. Knowing what went into a model is the precondition for knowing what could come out of it. Few tools track this; the few that do matter disproportionately.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-training-data-provenance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-training-data-provenance</guid>
      <pubDate>Mon, 09 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Mitigating npm Install Scripts Without Breaking Your Build]]></title>
      <description><![CDATA[`--ignore-scripts` is the blunt fix that breaks node-sass and better-sqlite3. Here is the surgical version that keeps builds green and postinstalls contained.]]></description>
      <link>https://safeguard.sh/resources/blog/mitigate-npm-install-scripts-without-breaking-builds</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mitigate-npm-install-scripts-without-breaking-builds</guid>
      <pubDate>Mon, 09 Mar 2026 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard vs Wiz: Supply Chain Focus 2026]]></title>
      <description><![CDATA[How Safeguard.sh and Wiz compare in 2026 for software supply chain security, SCA depth, container provenance, and autonomous remediation.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-vs-wiz-supply-chain-focus-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-vs-wiz-supply-chain-focus-2026</guid>
      <pubDate>Mon, 09 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security for Healthcare (HIPAA) 2026]]></title>
      <description><![CDATA[Software supply chain security for healthcare in 2026 means the new HIPAA Security Rule, 405(d) practices, and FDA postmarket expectations converging on SBOM.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-security-healthcare-hipaa-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-security-healthcare-hipaa-2026</guid>
      <pubDate>Mon, 09 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Vendor Offboarding and Supply Chain Data Destruction]]></title>
      <description><![CDATA[A practical playbook for offboarding software vendors and ensuring data is actually destroyed, not just promised to be destroyed, across complex subprocessor chains.]]></description>
      <link>https://safeguard.sh/resources/blog/vendor-offboarding-supply-chain-data-destruction</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vendor-offboarding-supply-chain-data-destruction</guid>
      <pubDate>Mon, 09 Mar 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cost Per Finding: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Token spend per scan is the wrong metric. Cost per actionable finding is the right one — and it&apos;s where engine-plus-LLM economics dominate pure-LLM economics.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cost-per-finding</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cost-per-finding</guid>
      <pubDate>Sun, 08 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Confusion: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Dependency confusion is older than most of the AI tooling trying to detect it. The attacks have adapted to the defences — detection needs to keep up.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-dependency-confusion-scenarios</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-dependency-confusion-scenarios</guid>
      <pubDate>Sun, 08 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Poolside for Enterprise Security]]></title>
      <description><![CDATA[Poolside's on-prem code AI is a credible enterprise offering. For security-specific workflows, Griffin AI's grounding architecture targets different ground.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-poolside-for-enterprise-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-poolside-for-enterprise-security</guid>
      <pubDate>Sun, 08 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[JSR JavaScript Registry Security Model]]></title>
      <description><![CDATA[JSR reimagines JavaScript package distribution with mandatory signing, scoped namespaces, and provenance by default. Here is how the security model works.]]></description>
      <link>https://safeguard.sh/resources/blog/jsr-javascript-registry-security-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jsr-javascript-registry-security-model</guid>
      <pubDate>Sun, 08 Mar 2026 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MCP Authentication Patterns for Enterprise]]></title>
      <description><![CDATA[Enterprise MCP deployments need more than a static API key. The protocol is evolving toward OAuth 2.1 and dynamic client registration, and understanding which pattern fits which workload decides whether your rollout survives the first audit.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-authentication-patterns-enterprise</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-authentication-patterns-enterprise</guid>
      <pubDate>Sun, 08 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Snowflake Customer Breaches 2024: Root Cause]]></title>
      <description><![CDATA[The Snowflake customer breaches of 2024 were not a Snowflake compromise. Infostealer logs, shared credentials, and absent MFA did the damage, from Ticketmaster to AT&T.]]></description>
      <link>https://safeguard.sh/resources/blog/snowflake-customer-breaches-2024-root-cause</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/snowflake-customer-breaches-2024-root-cause</guid>
      <pubDate>Sun, 08 Mar 2026 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Signing and Code Integrity in 2026: The Practical State of Play]]></title>
      <description><![CDATA[Where software signing stands today, what Sigstore and friends changed, and why most organizations still ship unsigned artifacts.]]></description>
      <link>https://safeguard.sh/resources/blog/software-signing-code-integrity-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-signing-code-integrity-2026</guid>
      <pubDate>Sun, 08 Mar 2026 09:00:00 GMT</pubDate>
      <category>Industry Trends</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise AI Red Team Program Design]]></title>
      <description><![CDATA[AI red teaming is not a one-off exercise. Programmatic red-teaming of AI systems requires specific structure — and most organisations don&apos;t have it yet.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-ai-red-team-program-design</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-ai-red-team-program-design</guid>
      <pubDate>Sat, 07 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Elastic Scale Behaviour: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Scanning bursts when a monorepo merges. We explain why Griffin AI absorbs the spike gracefully while Mythos-class tools degrade into rate-limit queues.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-elastic-scale-behaviour</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-elastic-scale-behaviour</guid>
      <pubDate>Sat, 07 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Open Weights: The Eval Gap]]></title>
      <description><![CDATA[Frontier models pass eval benchmarks that open-weight models miss by specific measurable margins. For security workflows, the gap matters.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-open-weight-eval-gap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-open-weight-eval-gap</guid>
      <pubDate>Sat, 07 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Akira Ransomware VPN Appliance Exploitation]]></title>
      <description><![CDATA[Akira has industrialized VPN appliance exploitation. Here is the tradecraft, the advisories that document it, and what defenders must do about edge software supply chain risk.]]></description>
      <link>https://safeguard.sh/resources/blog/akira-ransomware-vpn-appliance-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/akira-ransomware-vpn-appliance-exploitation</guid>
      <pubDate>Sat, 07 Mar 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[OSS Maintainer Account Takeover Trends 2025]]></title>
      <description><![CDATA[A senior engineer's breakdown of how maintainer account takeovers evolved in 2025, from phishing kits targeting PyPI to session token theft on GitHub and npm.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-maintainer-account-takeover-trends-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-maintainer-account-takeover-trends-2025</guid>
      <pubDate>Sat, 07 Mar 2026 09:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2025-1974 Ingress NGINX Controller RCE]]></title>
      <description><![CDATA[IngressNightmare - CVE-2025-1974 in Kubernetes ingress-nginx - gave unauthenticated attackers cluster-wide RCE. Here is how it worked and what to harden now.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2025-1974-ingress-nginx-controller-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2025-1974-ingress-nginx-controller-rce</guid>
      <pubDate>Sat, 07 Mar 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Reproducibility Crisis In AI Security Evals]]></title>
      <description><![CDATA[ML research has a reproducibility crisis. AI security evaluation inherits it. Vendors publishing numbers that can&apos;t be reproduced are the norm — not the exception.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-reproducibility-crisis-mini</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-reproducibility-crisis-mini</guid>
      <pubDate>Fri, 06 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Claude Prompt Caching: Security]]></title>
      <description><![CDATA[Claude's prompt caching gives you 90% discount on cached tokens. Security workloads have massive cacheable surface area. Griffin AI takes advantage; direct API use often does not.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-claude-prompt-caching-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-claude-prompt-caching-for-security</guid>
      <pubDate>Fri, 06 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Auth Bypass Discovery: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Auth bypasses are rarely a single bug. They live in the interaction between layers — middleware, route handlers, framework annotations. Finding them requires path analysis across abstraction layers.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-auth-bypass-discovery</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-auth-bypass-discovery</guid>
      <pubDate>Fri, 06 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How to Generate an SBOM with GitHub Actions (2026)]]></title>
      <description><![CDATA[SBOMs are a compliance table-stakes artifact in 2026. Here is a production GitHub Actions workflow that generates, signs, and attests a CycloneDX SBOM on every release.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-generate-sbom-github-actions-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-generate-sbom-github-actions-2026</guid>
      <pubDate>Fri, 06 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI 2FA Lessons Two Years In]]></title>
      <description><![CDATA[PyPI mandated 2FA for all maintainers in 2024. Two years in, account takeovers dropped — but attackers shifted to OIDC tokens, abandoned packages, and maintainer devices.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-2fa-lessons-two-years-in</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-2fa-lessons-two-years-in</guid>
      <pubDate>Fri, 06 Mar 2026 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How to Detect Malicious npm Packages: A Workflow]]></title>
      <description><![CDATA[A practical detection workflow for malicious npm packages: install-time signals, registry heuristics, reachability checks, and CI gates that actually block attacks.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-detect-malicious-npm-packages-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-detect-malicious-npm-packages-workflow</guid>
      <pubDate>Fri, 06 Mar 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Procurement Security Questionnaires That Actually Work]]></title>
      <description><![CDATA[How to design a supplier security questionnaire that produces usable signal, what to cut from standard templates, and how to integrate the output into real risk decisions.]]></description>
      <link>https://safeguard.sh/resources/blog/procurement-security-questionnaires-that-work</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/procurement-security-questionnaires-that-work</guid>
      <pubDate>Fri, 06 Mar 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Desktop App 1.0 Release]]></title>
      <description><![CDATA[The Safeguard desktop application is 1.0 on macOS, Windows, and Linux. It brings the full workflow engine, Local Runner, and offline posture reviews to developers.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-desktop-application-1-0-release</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-desktop-application-1-0-release</guid>
      <pubDate>Fri, 06 Mar 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2024-32002 Git RCE on Clone: Walkthrough]]></title>
      <description><![CDATA[CVE-2024-32002 is a Git submodule RCE triggered by a recursive clone on case-insensitive filesystems. Root cause, exploit, and remediation.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-32002-git-rce-on-clone-walkthrough</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-32002-git-rce-on-clone-walkthrough</guid>
      <pubDate>Fri, 06 Mar 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security Market Map 2026]]></title>
      <description><![CDATA[A senior-analyst market map of software supply chain security in 2026: the vendor categories that consolidated, the ones that splintered, and where the budget actually lands.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-security-market-map-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-security-market-map-2026</guid>
      <pubDate>Fri, 06 Mar 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Chain-Of-Thought For Vulnerability Reasoning]]></title>
      <description><![CDATA[Chain-of-thought helps LLMs with multi-step problems. For vulnerability reasoning, it helps — but only when the chain is grounded in structured evidence.]]></description>
      <link>https://safeguard.sh/resources/blog/chain-of-thought-for-vulnerability-reasoning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chain-of-thought-for-vulnerability-reasoning</guid>
      <pubDate>Thu, 05 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Context Window Limits: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Context-window size matters less than context quality. A look at how Griffin AI's engine-grounded context beats pure-LLM retrieval at monorepo scale.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-context-window-limits</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-context-window-limits</guid>
      <pubDate>Thu, 05 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs OpenAI Assistants API for SecOps]]></title>
      <description><![CDATA[The OpenAI Assistants API is a general agent framework. SecOps needs more than a framework — it needs the engine-grounded reasoning Griffin AI adds on top.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-openai-assistants-api-for-secops</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-openai-assistants-api-for-secops</guid>
      <pubDate>Thu, 05 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Post-Quantum Signing: An Artifact Migration Plan]]></title>
      <description><![CDATA[A concrete migration plan for artifact signing from ECDSA to ML-DSA and SLH-DSA, covering Sigstore, Notary, HSMs, and staged hybrid rollouts.]]></description>
      <link>https://safeguard.sh/resources/blog/post-quantum-signing-artifact-migration-plan</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/post-quantum-signing-artifact-migration-plan</guid>
      <pubDate>Thu, 05 Mar 2026 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Change Healthcare Ransomware 2024: Deep Dive]]></title>
      <description><![CDATA[The Change Healthcare ransomware attack knocked US healthcare payments offline for weeks. A missing MFA on a Citrix portal was the root cause United confirmed.]]></description>
      <link>https://safeguard.sh/resources/blog/change-healthcare-ransomware-2024-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/change-healthcare-ransomware-2024-deep-dive</guid>
      <pubDate>Thu, 05 Mar 2026 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard vs Aqua Security Platform Review]]></title>
      <description><![CDATA[A fact-based comparison of Safeguard.sh and Aqua Security in 2026 across container coverage, runtime protection, SCA depth, and supply chain capabilities.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-vs-aqua-security-platform-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-vs-aqua-security-platform-review</guid>
      <pubDate>Thu, 05 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Supply Chain Attack Kill Chain: A Framework for Defense]]></title>
      <description><![CDATA[We propose a kill chain framework specific to software supply chain attacks, mapping attacker techniques to defensive controls at each stage.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-attack-kill-chain-framework</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-attack-kill-chain-framework</guid>
      <pubDate>Thu, 05 Mar 2026 10:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[The Future of Software Signing Is Keyless]]></title>
      <description><![CDATA[Long-lived signing keys are operational debt that every security team eventually pays down the hard way. Keyless signing is not an experiment anymore — it is the mainstream design.]]></description>
      <link>https://safeguard.sh/resources/blog/the-future-of-software-signing-is-keyless</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/the-future-of-software-signing-is-keyless</guid>
      <pubDate>Thu, 05 Mar 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Composer/PHP Package Supply Chain in 2026]]></title>
      <description><![CDATA[PHP's Composer and Packagist ecosystem has quietly improved its supply chain story. Here is where things actually stand in 2026, and what PHP shops should do now.]]></description>
      <link>https://safeguard.sh/resources/blog/composer-php-package-supply-chain-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/composer-php-package-supply-chain-2026</guid>
      <pubDate>Thu, 05 Mar 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Security for Financial Services 2026]]></title>
      <description><![CDATA[Supply chain security for financial services in 2026 means DORA, NYDFS 500, FFIEC, and OCC expectations. A practical guide for banks, insurers, and fintechs.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-financial-services-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-financial-services-2026</guid>
      <pubDate>Thu, 05 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CISA Minimum Elements for SBOM: 2026 Update]]></title>
      <description><![CDATA[A clear walkthrough of CISA's 2026 revisions to the minimum elements for SBOM, what changed from the original NTIA baseline, and how to bring your outputs into compliance.]]></description>
      <link>https://safeguard.sh/resources/blog/minimum-elements-sbom-cisa-2026-update</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/minimum-elements-sbom-cisa-2026-update</guid>
      <pubDate>Wed, 04 Mar 2026 15:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Model Substitution Risk In Enterprise Deployments]]></title>
      <description><![CDATA[The model you think you&apos;re calling might not be the model that returns. Model substitution is a quiet supply chain risk that deserves explicit controls.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-model-substitution-risk</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-model-substitution-risk</guid>
      <pubDate>Wed, 04 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemini Pricing: Security Scans]]></title>
      <description><![CDATA[Gemini's pricing table favours long-context workloads. Security scans have long-context structure. The question is how much context fits into the architecture.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-pricing-for-security-scans</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-pricing-for-security-scans</guid>
      <pubDate>Wed, 04 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Onboarding Velocity: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Time from contract signature to first meaningful finding is the metric procurement cares about. Griffin AI and Mythos-class tools diverge in week one.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-onboarding-velocity</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-onboarding-velocity</guid>
      <pubDate>Wed, 04 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Generation: Syft, Tern, Trivy Compared (2026)]]></title>
      <description><![CDATA[An engineer's side-by-side of Syft, Tern, and Trivy for SBOM generation in 2026, with honest notes on accuracy, performance, and where each tool actually fits.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-generation-tools-syft-tern-comparison-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-generation-tools-syft-tern-comparison-2026</guid>
      <pubDate>Wed, 04 Mar 2026 12:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM-Driven Due Diligence for M&A]]></title>
      <description><![CDATA[How SBOMs have become a standard input to technical due diligence for software acquisitions, what acquirers actually look for, and how sellers should prepare.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-mergers-acquisitions-due-diligence</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-mergers-acquisitions-due-diligence</guid>
      <pubDate>Wed, 04 Mar 2026 09:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[RAG Poisoning In The Wild: Trend Watch]]></title>
      <description><![CDATA[Retrieval-augmented generation was the 2024 success story. 2026 is when RAG poisoning moved from research to production incidents.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-rag-poisoning-in-the-wild</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-rag-poisoning-in-the-wild</guid>
      <pubDate>Tue, 03 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Transitive Fix Cascades: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A vulnerable transitive dependency may require upgrading an ancestor. Griffin AI computes the cascade; Mythos-class tools often stop at the first level.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-transitive-fix-cascades</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-transitive-fix-cascades</guid>
      <pubDate>Tue, 03 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How to Comply With EU CRA: A Practical Checklist]]></title>
      <description><![CDATA[The EU Cyber Resilience Act requires vendors to ship secure-by-default products, provide SBOMs, and report exploited vulnerabilities within 24 hours. Here is a concrete compliance path.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-comply-eu-cyber-resilience-act-checklist</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-comply-eu-cyber-resilience-act-checklist</guid>
      <pubDate>Tue, 03 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Minimal Base Image Myth: What Actually Reduces Attack Surface]]></title>
      <description><![CDATA[Alpine, distroless, and scratch images don't automatically cut risk. The real attack-surface drivers are capabilities, root filesystem, network policies, and seccomp.]]></description>
      <link>https://safeguard.sh/resources/blog/minimal-base-image-myth-attack-surface-reduction</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/minimal-base-image-myth-attack-surface-reduction</guid>
      <pubDate>Tue, 03 Mar 2026 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[npm Protestware Patterns From 2020 to 2026]]></title>
      <description><![CDATA[A senior engineer's view of six years of npm protestware, from colors.js to peacenotwar, and the supply chain lessons that still apply to modern JavaScript shops.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-protestware-patterns-2020-to-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-protestware-patterns-2020-to-2026</guid>
      <pubDate>Tue, 03 Mar 2026 09:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Right-to-Repair and Software Supply Chain Security]]></title>
      <description><![CDATA[How the right-to-repair movement is reshaping software supply chain obligations in 2026, from firmware transparency to the security implications of mandated component access.]]></description>
      <link>https://safeguard.sh/resources/blog/right-to-repair-software-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/right-to-repair-software-supply-chain-security</guid>
      <pubDate>Tue, 03 Mar 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[EU AI Act Alignment: Griffin AI vs Mythos]]></title>
      <description><![CDATA[EU AI Act enforcement began in 2026. Vendors sold as &quot;AI security tools&quot; are now high-risk systems with documentation obligations. The shape of the documentation matters.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-eu-ai-act-alignment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-eu-ai-act-alignment</guid>
      <pubDate>Mon, 02 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Version-Aware Resolution: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A vulnerability in version 1.2.0 may not affect your 1.3.5 install if the fix reshaped the call signature. Version-aware resolution is where deterministic engines beat pure-LLM heuristics.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-version-aware-resolution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-version-aware-resolution</guid>
      <pubDate>Mon, 02 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Nullcon Berlin 2026 Supply Chain Highlights]]></title>
      <description><![CDATA[Nullcon Berlin 2026 delivered a dense European view of software supply chain research. Here are the themes and sessions that mattered most to defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/nullcon-berlin-2026-software-supply-chain-highlights</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nullcon-berlin-2026-software-supply-chain-highlights</guid>
      <pubDate>Mon, 02 Mar 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard vs GitHub Advanced Security 2026]]></title>
      <description><![CDATA[A technical comparison of Safeguard.sh and GitHub Advanced Security in 2026 across scanning depth, secret detection, container coverage, and cost.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-vs-github-advanced-security-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-vs-github-advanced-security-2026</guid>
      <pubDate>Mon, 02 Mar 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How to Audit Open Source Licenses for Compliance]]></title>
      <description><![CDATA[A senior engineer's playbook for auditing open source licenses across modern polyglot repos, from SPDX extraction to enforcement in CI and legal reporting.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-audit-open-source-licenses-compliance-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-audit-open-source-licenses-compliance-guide</guid>
      <pubDate>Mon, 02 Mar 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Open Source Manager: A Deep Dive Into Dependency Governance]]></title>
      <description><![CDATA[An inside look at Safeguard's Open Source Manager — how it tracks, evaluates, and enforces policies across every open-source dependency in your portfolio.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-open-source-manager-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-open-source-manager-deep-dive</guid>
      <pubDate>Mon, 02 Mar 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Requirements for Automotive (ISO 21434) 2026]]></title>
      <description><![CDATA[A senior engineer's guide to SBOM requirements for automotive suppliers under ISO/SAE 21434, UNECE WP.29 R155, and the 2026 enforcement landscape for connected vehicles.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-requirements-automotive-iso-21434-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-requirements-automotive-iso-21434-2026</guid>
      <pubDate>Mon, 02 Mar 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Volt Typhoon: Critical Infrastructure Supply Chain]]></title>
      <description><![CDATA[Volt Typhoon is pre-positioning inside U.S. critical infrastructure using living-off-the-land tradecraft and third-party access. Here is what defenders should do about it.]]></description>
      <link>https://safeguard.sh/resources/blog/volt-typhoon-critical-infrastructure-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/volt-typhoon-critical-infrastructure-supply-chain</guid>
      <pubDate>Mon, 02 Mar 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2024-21413 Outlook Moniker Link Analysis]]></title>
      <description><![CDATA[CVE-2024-21413 is a critical Outlook Moniker Link RCE that bypasses Protected View via a crafted file URL. Root cause, exploitation, and detection.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-21413-outlook-moniker-link-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-21413-outlook-moniker-link-analysis</guid>
      <pubDate>Mon, 02 Mar 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2024-55956 Cleo Harmony/VLTrader RCE]]></title>
      <description><![CDATA[Cleo's Harmony, VLTrader, and LexiCom carried an unauthenticated RCE that Clop abused for mass data theft. Here is the technical breakdown and the defender's takeaway.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-55956-cleo-harmony-vltrader-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-55956-cleo-harmony-vltrader-rce</guid>
      <pubDate>Mon, 02 Mar 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Inventory: Griffin AI vs Mythos]]></title>
      <description><![CDATA[MCP servers are privileged dependencies. An inventory that tracks them like SBOM tracks packages is the minimum bar — and not every tool meets it.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-mcp-server-inventory</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-mcp-server-inventory</guid>
      <pubDate>Sun, 01 Mar 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Container Runtime Security in 2026: What's Changed and What Hasn't]]></title>
      <description><![CDATA[Container security has matured significantly, but runtime protection remains a weak spot. Here's a practical guide to what works.]]></description>
      <link>https://safeguard.sh/resources/blog/container-runtime-security-2026-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-runtime-security-2026-guide</guid>
      <pubDate>Sun, 01 Mar 2026 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[XZ Utils Backdoor: One Year Retrospective]]></title>
      <description><![CDATA[A year after the XZ Utils backdoor was caught by Andres Freund at Microsoft, what did we fix, what did we ignore, and what still gets packaged into Linux distros?]]></description>
      <link>https://safeguard.sh/resources/blog/xz-utils-aftermath-one-year-retrospective</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xz-utils-aftermath-one-year-retrospective</guid>
      <pubDate>Sun, 01 Mar 2026 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cloudflare Workers: Supply Chain Threat Model]]></title>
      <description><![CDATA[Cloudflare Workers collapse the build, deploy, and runtime into one surface. That changes the supply chain threat model in ways most teams underestimate.]]></description>
      <link>https://safeguard.sh/resources/blog/cloudflare-workers-supply-chain-threat-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloudflare-workers-supply-chain-threat-model</guid>
      <pubDate>Sun, 01 Mar 2026 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Container Security: Why Reachability Analysis Changes Everything]]></title>
      <description><![CDATA[Stop chasing phantom vulnerabilities. Learn how reachability analysis reduces CVE noise by 80% and focuses remediation on what actually matters.]]></description>
      <link>https://safeguard.sh/resources/blog/container-security-reachability-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-security-reachability-analysis</guid>
      <pubDate>Sun, 01 Mar 2026 00:00:00 GMT</pubDate>
      <category>Security</category>
      <author>hi@safeguard.sh (Safeguard Team)</author>
    </item>
    <item>
      <title><![CDATA[GenAI Coding Agent Privilege Escalation]]></title>
      <description><![CDATA[Autonomous coding agents can escalate privilege in subtle ways that traditional threat models miss. A breakdown of the common escalation paths and how to constrain them.]]></description>
      <link>https://safeguard.sh/resources/blog/genai-coding-agent-privilege-escalation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/genai-coding-agent-privilege-escalation</guid>
      <pubDate>Sat, 28 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs GitHub Copilot for Vulnerability Fixing]]></title>
      <description><![CDATA[GitHub Copilot suggests fixes. Griffin AI generates fix PRs with taint paths and disproof attached. The difference is review burden.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-github-copilot-for-vulnerability-fixing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-github-copilot-for-vulnerability-fixing</guid>
      <pubDate>Sat, 28 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Continuous Eval & Release Gating: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Evals that run once are marketing. Evals that run on every build are infrastructure. Griffin AI runs the harness on every change; Mythos does not describe one.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-continuous-eval-release-gating</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-continuous-eval-release-gating</guid>
      <pubDate>Sat, 28 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Race Condition Detection: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Race conditions are the hardest class of vulnerabilities for static analysis. Specific architectural capabilities separate tools that find them from tools that claim to.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-race-condition-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-race-condition-detection</guid>
      <pubDate>Sat, 28 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Post-Quantum Cryptography Migration for Software Supply Chains]]></title>
      <description><![CDATA[NIST finalized ML-KEM, ML-DSA, and SLH-DSA in 2024. Here's what it means for Sigstore, package registry signing, TLS, and the harvest-now-decrypt-later problem.]]></description>
      <link>https://safeguard.sh/resources/blog/post-quantum-cryptography-migration-supply-chains</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/post-quantum-cryptography-migration-supply-chains</guid>
      <pubDate>Sat, 28 Feb 2026 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How Safeguard Partners With MSSP Programs]]></title>
      <description><![CDATA[A practical guide to how Safeguard.sh works with managed security service providers — including the partners under exploratory discussion.]]></description>
      <link>https://safeguard.sh/resources/blog/how-safeguard-partners-with-mssp-programs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-safeguard-partners-with-mssp-programs</guid>
      <pubDate>Sat, 28 Feb 2026 09:00:00 GMT</pubDate>
      <category>Company</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cyber Insurance Exclusions for Supply Chain Incidents]]></title>
      <description><![CDATA[What 2026 cyber insurance policies actually exclude for software supply chain incidents, how carriers test your controls, and what to negotiate before renewal.]]></description>
      <link>https://safeguard.sh/resources/blog/insurance-cyber-policy-software-supply-chain-exclusions</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/insurance-cyber-policy-software-supply-chain-exclusions</guid>
      <pubDate>Sat, 28 Feb 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[JSR/Deno Package Ecosystem Supply Chain]]></title>
      <description><![CDATA[JSR is the first mainstream package registry designed with supply chain security as a founding constraint. Here is what it gets right and what it has not solved yet.]]></description>
      <link>https://safeguard.sh/resources/blog/jsr-deno-package-ecosystem-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jsr-deno-package-ecosystem-supply-chain</guid>
      <pubDate>Sat, 28 Feb 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise AI Data Residency Requirements, 2026]]></title>
      <description><![CDATA[Data residency for AI workloads has moved from nice-to-have to contractually required. The shape of the requirement is specific and worth knowing before procurement.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-ai-data-residency-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-ai-data-residency-requirements</guid>
      <pubDate>Fri, 27 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[False Positive Cost: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A false positive is not free. It costs engineer attention, trust in the tool, and eventually the security programme's credibility. We price the difference.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-false-positive-cost</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-false-positive-cost</guid>
      <pubDate>Fri, 27 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Injection Path Detection: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Injection vulnerabilities are not really about the sink. They are about the path from untrusted input to the sink. The path is where Griffin AI and Mythos-class tools diverge.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-injection-path-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-injection-path-detection</guid>
      <pubDate>Fri, 27 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Open Weights: On-Prem Tradeoffs]]></title>
      <description><![CDATA[Open-weight models let you run everything locally. The tradeoff is quality, cost, and operational overhead. Griffin AI provides a different answer to the same on-prem need.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-open-weight-on-prem-tradeoffs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-open-weight-on-prem-tradeoffs</guid>
      <pubDate>Fri, 27 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Fine-Tuning Poisoning Detection for Supply Chains]]></title>
      <description><![CDATA[Fine-tuning inherits every problem of the base model and adds dataset provenance as a new one. Here is how detection actually works in practice.]]></description>
      <link>https://safeguard.sh/resources/blog/fine-tuning-poisoning-detection-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fine-tuning-poisoning-detection-supply-chain</guid>
      <pubDate>Fri, 27 Feb 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard vs Snyk: Detailed 2026 Comparison]]></title>
      <description><![CDATA[A senior engineer's breakdown of how Safeguard.sh and Snyk differ in 2026 across SCA depth, reachability analysis, remediation, and container security.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-vs-snyk-comparison-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-vs-snyk-comparison-2026</guid>
      <pubDate>Fri, 27 Feb 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard MCP Server: Public Release Details]]></title>
      <description><![CDATA[The Safeguard MCP Server is publicly available and works with Claude Desktop, claude.ai, Claude Code, ChatGPT, Cursor, Gemini, and Grok. Here is the tool surface.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-mcp-server-public-release-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-mcp-server-public-release-2026</guid>
      <pubDate>Fri, 27 Feb 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2024-23897 Jenkins CLI File Read Deep Dive]]></title>
      <description><![CDATA[CVE-2024-23897 is a Jenkins CLI arbitrary file-read flaw that leaks secrets and enables RCE chains. Root cause, exploitation, and patch guidance.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-23897-jenkins-cli-file-read-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-23897-jenkins-cli-file-read-deep-dive</guid>
      <pubDate>Fri, 27 Feb 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[LLM-As-Judge Pitfalls In Security Evals]]></title>
      <description><![CDATA[Using an LLM to score another LLM&apos;s output is expedient and dangerous. The judge has its own biases — ones that affect security evaluations specifically.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-llm-as-judge-pitfalls</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-llm-as-judge-pitfalls</guid>
      <pubDate>Thu, 26 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Claude Batch API for Scanning]]></title>
      <description><![CDATA[Claude's Batch API gives you 50% off for async workloads. Griffin AI uses it internally. The question is whether your team should use the Batch API directly or consume it through Griffin.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-claude-batch-api-for-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-claude-batch-api-for-scanning</guid>
      <pubDate>Thu, 26 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Automotive OEM ISO 21434 Compliance]]></title>
      <description><![CDATA[An anonymized look at how a major automotive OEM used Safeguard.sh to operationalize ISO/SAE 21434 software supply chain requirements across vehicle platforms.]]></description>
      <link>https://safeguard.sh/resources/blog/customer-story-automotive-oem-iso-21434-compliance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/customer-story-automotive-oem-iso-21434-compliance</guid>
      <pubDate>Thu, 26 Feb 2026 10:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Why Developer Experience Matters to Security Programs]]></title>
      <description><![CDATA[Security programs that ignore developer experience fail. This is not a culture complaint — it is a throughput argument, and the math is unforgiving.]]></description>
      <link>https://safeguard.sh/resources/blog/why-developer-experience-matters-security-programs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/why-developer-experience-matters-security-programs</guid>
      <pubDate>Thu, 26 Feb 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Update Triage Strategy for Eng Teams]]></title>
      <description><![CDATA[An update PR is not a security finding. Here is a triage model that keeps reachability, risk, and engineering effort in the right conversation.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-update-triage-strategy-engineering-teams</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-update-triage-strategy-engineering-teams</guid>
      <pubDate>Thu, 26 Feb 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Quality Across Ecosystems: 2026 Report]]></title>
      <description><![CDATA[The Safeguard Research team measured SBOM quality across ecosystems and generators. The gaps between formats, tools, and languages are larger than most teams assume.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-research-sbom-quality-across-ecosystems-report</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-research-sbom-quality-across-ecosystems-report</guid>
      <pubDate>Thu, 26 Feb 2026 09:00:00 GMT</pubDate>
      <category>Research</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs GPT-5: Enterprise Controls]]></title>
      <description><![CDATA[Frontier models offer impressive enterprise features. Security programs need deeper controls than chat can provide—controls that live in the engine around the model.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-5-enterprise-controls</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-5-enterprise-controls</guid>
      <pubDate>Wed, 25 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Why Engine-Plus-LLM Beats Pure-LLM: Griffin vs Mythos]]></title>
      <description><![CDATA[The structural case for engine-plus-LLM security reasoning — and why pure-LLM products in the Mythos class hit a ceiling that no parameter count can raise.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-engine-plus-llm-advantage</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-engine-plus-llm-advantage</guid>
      <pubDate>Wed, 25 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Task-Routed LLM Architectures For Security]]></title>
      <description><![CDATA[One model for every task wastes budget on trivial work. Task-routed architectures match model capability to task requirements — the right lever for security at scale.]]></description>
      <link>https://safeguard.sh/resources/blog/task-routed-llm-architectures-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/task-routed-llm-architectures-for-security</guid>
      <pubDate>Wed, 25 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Windsurf vs Sourcegraph Cody: Security Comparison]]></title>
      <description><![CDATA[A side-by-side security comparison of Windsurf and Sourcegraph Cody: data handling, agent scope, deployment models, and enterprise controls.]]></description>
      <link>https://safeguard.sh/resources/blog/windsurf-cody-security-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/windsurf-cody-security-comparison</guid>
      <pubDate>Wed, 25 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Microsoft Midnight Blizzard Source Code Theft 2024]]></title>
      <description><![CDATA[Midnight Blizzard moved from email exfiltration to Microsoft source code repositories. The pivot from stolen OAuth tokens to code access is the supply chain lesson.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-midnight-blizzard-source-code-theft-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-midnight-blizzard-source-code-theft-2024</guid>
      <pubDate>Wed, 25 Feb 2026 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs for Firmware and IoT Devices: The Hard Problem]]></title>
      <description><![CDATA[Generating accurate SBOMs for firmware and IoT devices remains one of the toughest challenges in supply chain security. Here's the current state of the art.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-firmware-iot-devices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-firmware-iot-devices</guid>
      <pubDate>Wed, 25 Feb 2026 10:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Cozy Bear / Midnight Blizzard Supply Chain Tactics]]></title>
      <description><![CDATA[Midnight Blizzard (APT29, Cozy Bear) has refined long-dwell supply chain access into an operational art. Here is what their 2023-2025 pattern looks like to defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/apt-cozy-bear-midnight-blizzard-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apt-cozy-bear-midnight-blizzard-supply-chain</guid>
      <pubDate>Wed, 25 Feb 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[DORA for Financial Services Software Supply Chain]]></title>
      <description><![CDATA[How EU DORA is reshaping software supply chain expectations for financial services in 2026, with practical guidance on ICT third-party risk, SBOMs, and incident reporting.]]></description>
      <link>https://safeguard.sh/resources/blog/dora-eu-software-supply-chain-for-financial-services</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dora-eu-software-supply-chain-for-financial-services</guid>
      <pubDate>Wed, 25 Feb 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2024-45519 Zimbra Unauth RCE Breakdown]]></title>
      <description><![CDATA[A technical breakdown of CVE-2024-45519, the unauthenticated RCE in Zimbra's postjournal service, how it was exploited in the wild, and what defenders should take away.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-45519-zimbra-unauth-rce-breakdown</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-45519-zimbra-unauth-rce-breakdown</guid>
      <pubDate>Wed, 25 Feb 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Retrieval Context Poisoning At Scale]]></title>
      <description><![CDATA[Retrieval context poisoning scales differently than direct prompt injection. The attacker&apos;s leverage grows with the RAG ingest surface.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-retrieval-context-poisoning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-retrieval-context-poisoning</guid>
      <pubDate>Tue, 24 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemini Multimodal: Security]]></title>
      <description><![CDATA[Gemini's multimodal capabilities are genuinely useful for some security workflows. For most security workflows, the modality is code and text, not images.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-multimodal-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-multimodal-for-security</guid>
      <pubDate>Tue, 24 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Federal Compliance Readiness: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Federal compliance is a long investment, not a marketing claim. Safeguard's FedRAMP HIGH and IL7 readiness is the difference between selling into government and sitting on the outside.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-federal-compliance-readiness</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-federal-compliance-readiness</guid>
      <pubDate>Tue, 24 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Incident Response Playbook for a Compromised Dependency]]></title>
      <description><![CDATA[A concrete, timed playbook for the 72 hours after a critical dependency advisory — inventory, reachability, containment, remediation, and retrospective.]]></description>
      <link>https://safeguard.sh/resources/blog/incident-response-playbook-compromised-dependency</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/incident-response-playbook-compromised-dependency</guid>
      <pubDate>Tue, 24 Feb 2026 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AWS EKS Pod Identity vs. IRSA for Supply Chain]]></title>
      <description><![CDATA[Pod Identity and IRSA both give EKS workloads AWS identities. The supply chain implications diverge once you look past the docs.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-eks-pod-identity-vs-irsa-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-eks-pod-identity-vs-irsa-supply-chain</guid>
      <pubDate>Tue, 24 Feb 2026 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Buy vs. Build a Supply Chain Security Platform]]></title>
      <description><![CDATA[When building your own software supply chain security platform makes sense, when it does not, and the hybrid architecture most mature teams actually land on.]]></description>
      <link>https://safeguard.sh/resources/blog/buy-vs-build-supply-chain-security-platform</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/buy-vs-build-supply-chain-security-platform</guid>
      <pubDate>Tue, 24 Feb 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[pnpm and Yarn Modern Lockfile Security]]></title>
      <description><![CDATA[pnpm-lock.yaml and yarn.lock look similar on the surface but enforce different security properties. Here is what matters in 2026, and what still trips teams up.]]></description>
      <link>https://safeguard.sh/resources/blog/pnpm-yarn-modern-lockfile-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pnpm-yarn-modern-lockfile-security</guid>
      <pubDate>Tue, 24 Feb 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Eval Culture Shift in AI Security]]></title>
      <description><![CDATA[Two years ago, AI vendors shipped without evals. In 2026, the posture has shifted. Customers expect benchmarks. Vendors without them lose deals.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-eval-culture-shift</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-eval-culture-shift</guid>
      <pubDate>Mon, 23 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Upgrade Picks: Griffin AI vs Mythos]]></title>
      <description><![CDATA[The version a remediation tool picks matters more than the fact that it picked one. Griffin AI grounds its choice in the project; Mythos-class tools do not.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-dependency-upgrade-recommendations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-dependency-upgrade-recommendations</guid>
      <pubDate>Mon, 23 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Gartner SRM Summit 2025 Recap]]></title>
      <description><![CDATA[Gartner's 2025 Security & Risk Management Summit pushed CISOs to focus on supply chain risk, AI governance, and measurable outcomes. Here is the analyst view.]]></description>
      <link>https://safeguard.sh/resources/blog/gartner-security-risk-management-summit-2025-recap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gartner-security-risk-management-summit-2025-recap</guid>
      <pubDate>Mon, 23 Feb 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CVE-2024-4577 PHP CGI Argument Injection Explained]]></title>
      <description><![CDATA[CVE-2024-4577 is a CVSS 9.8 argument injection in PHP-CGI on Windows that bypasses CVE-2012-1823's fix. Root cause, exploitation, and remediation.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-4577-php-cgi-argument-injection-explained</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-4577-php-cgi-argument-injection-explained</guid>
      <pubDate>Mon, 23 Feb 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[HIPAA Supply Chain Controls: Griffin AI vs Mythos]]></title>
      <description><![CDATA[HIPAA's software supply chain expectations have sharpened in 2025-2026. Evidence generation is the difference between passing an audit and rerunning it.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-hipaa-supply-chain-controls</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-hipaa-supply-chain-controls</guid>
      <pubDate>Sun, 22 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Source/Sink Classification: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Taint analysis only works if sources and sinks are labeled correctly. Griffin AI uses a curated catalog; Mythos-class tools infer on the fly.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-source-sink-classification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-source-sink-classification</guid>
      <pubDate>Sun, 22 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Registry Security Governance]]></title>
      <description><![CDATA[MCP servers are becoming a new dependency class with their own supply chain risks. How to think about registry governance, verification, and enterprise ingestion policy.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-server-registry-security-governance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-server-registry-security-governance</guid>
      <pubDate>Sun, 22 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Agent-to-Agent Security in Multi-Agent Systems]]></title>
      <description><![CDATA[Multi-agent systems inherit every trust problem of single-agent systems and add a few more. Here is how the threat model actually shifts.]]></description>
      <link>https://safeguard.sh/resources/blog/agent-to-agent-security-multi-agent-systems</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/agent-to-agent-security-multi-agent-systems</guid>
      <pubDate>Sun, 22 Feb 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FAQ: When Do You Need a Dedicated SBOM Tool?]]></title>
      <description><![CDATA[When a scanner's built-in SBOM export stops being enough — signals you need a dedicated SBOM tool, what one actually does, and how to evaluate.]]></description>
      <link>https://safeguard.sh/resources/blog/faq-when-do-you-need-a-dedicated-sbom-tool</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/faq-when-do-you-need-a-dedicated-sbom-tool</guid>
      <pubDate>Sun, 22 Feb 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Federal Software Procurement and SBOM Requirements: A Vendor's Playbook]]></title>
      <description><![CDATA[If you sell software to the US government, SBOM requirements are now non-negotiable. Here's a practical playbook for compliance.]]></description>
      <link>https://safeguard.sh/resources/blog/federal-software-procurement-sbom-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/federal-software-procurement-sbom-requirements</guid>
      <pubDate>Sun, 22 Feb 2026 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Multi-Arch Image Builds and Attestation Pitfalls]]></title>
      <description><![CDATA[Why multi-architecture container images break assumptions baked into signing, SBOM, and attestation tooling, and how to build a multi-arch pipeline that stays verifiable.]]></description>
      <link>https://safeguard.sh/resources/blog/multi-arch-image-builds-attestation-pitfalls</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/multi-arch-image-builds-attestation-pitfalls</guid>
      <pubDate>Sun, 22 Feb 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Model Inventory Tracking: Griffin AI vs Mythos]]></title>
      <description><![CDATA[You cannot secure what you cannot enumerate. Griffin AI maintains a typed inventory of every model, version, and deployment across a tenant. Mythos-class tools approximate the inventory in prose.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-model-inventory-tracking</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-model-inventory-tracking</guid>
      <pubDate>Sat, 21 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Cursor Tab for Security Review]]></title>
      <description><![CDATA[Cursor Tab is excellent at in-editor autocomplete. For security review, the workflow is different enough that the right answer is to use both.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-cursor-tab-for-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-cursor-tab-for-security-review</guid>
      <pubDate>Fri, 20 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CSRF Modern Forms: Griffin AI vs Mythos]]></title>
      <description><![CDATA[CSRF in 2026 is not the 2012 attack. SameSite cookies, fetch metadata, and modern frameworks changed the landscape. Detection needs to keep up.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-csrf-modern-forms</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-csrf-modern-forms</guid>
      <pubDate>Fri, 20 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Golden Dataset Design: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Benchmark scores are only as honest as the dataset behind them. Griffin AI publishes golden-dataset design notes; Mythos-class tools rarely explain theirs.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-golden-dataset-design</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-golden-dataset-design</guid>
      <pubDate>Fri, 20 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[KEV, EPSS, CVSS: Which Signal Should Drive Patching?]]></title>
      <description><![CDATA[CVSS measures severity, EPSS predicts exploitation, KEV confirms active exploitation. Each answers a different question, and patching policy should use all three.]]></description>
      <link>https://safeguard.sh/resources/blog/kev-epss-cvss-which-signal-drives-patching</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kev-epss-cvss-which-signal-drives-patching</guid>
      <pubDate>Fri, 20 Feb 2026 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Security Summit 2026: Key Takeaways]]></title>
      <description><![CDATA[We attended the Open Source Security Summit 2026 and came back with five actionable insights for security teams.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-security-summit-2026-recap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-security-summit-2026-recap</guid>
      <pubDate>Fri, 20 Feb 2026 10:00:00 GMT</pubDate>
      <category>Events</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[cargo-audit and cargo-deny: A Real Workflow]]></title>
      <description><![CDATA[A senior-engineer-grade workflow for using cargo-audit and cargo-deny together, with realistic policy decisions and the mistakes teams repeat.]]></description>
      <link>https://safeguard.sh/resources/blog/cargo-audit-deny-advisories-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cargo-audit-deny-advisories-workflow</guid>
      <pubDate>Fri, 20 Feb 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Dependabot vs. Renovate: Operational Experience]]></title>
      <description><![CDATA[Both tools open the same kind of PR. The differences that matter at scale show up in configuration, grouping, platform support, and what happens when something breaks.]]></description>
      <link>https://safeguard.sh/resources/blog/dependabot-vs-renovate-operational-experience</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependabot-vs-renovate-operational-experience</guid>
      <pubDate>Fri, 20 Feb 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[DPRK IT Worker Supply Chain Insider Threat]]></title>
      <description><![CDATA[DPRK operatives have placed themselves inside Western companies as remote developers. Here is how that pattern functions as a supply chain threat and how to detect it.]]></description>
      <link>https://safeguard.sh/resources/blog/north-korea-it-worker-supply-chain-insider-threat</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/north-korea-it-worker-supply-chain-insider-threat</guid>
      <pubDate>Fri, 20 Feb 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Partnership Strategy 2026]]></title>
      <description><![CDATA[How Safeguard.sh thinks about partnerships in 2026 — the motions we prioritize, the partners we seek, and the customer outcomes that drive the strategy.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-partnership-strategy-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-partnership-strategy-2026</guid>
      <pubDate>Fri, 20 Feb 2026 09:00:00 GMT</pubDate>
      <category>Company</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Self-Healing Containers Now Generally Available]]></title>
      <description><![CDATA[Self-healing containers detect, remediate, and rebuild images when CVEs appear in their dependency closure. Here is how the GA feature works in practice.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-self-healing-containers-general-availability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-self-healing-containers-general-availability</guid>
      <pubDate>Fri, 20 Feb 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[TCO of SCA Platforms in 2026: What to Model]]></title>
      <description><![CDATA[A realistic model for the total cost of ownership of software composition analysis platforms in 2026, including the hidden costs vendors do not surface in their pricing pages.]]></description>
      <link>https://safeguard.sh/resources/blog/total-cost-of-ownership-sca-platforms-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/total-cost-of-ownership-sca-platforms-2026</guid>
      <pubDate>Fri, 20 Feb 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Hugging Face Model Hub Supply Chain Risks in 2025]]></title>
      <description><![CDATA[Pickle deserialization, malicious Spaces, and namespace squatting: what 2024-2025 taught us about the Hugging Face model supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/huggingface-model-hub-supply-chain-risks-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/huggingface-model-hub-supply-chain-risks-2025</guid>
      <pubDate>Fri, 20 Feb 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise AI Procurement Due Diligence Checklist]]></title>
      <description><![CDATA[AI-for-security procurement covers more than feature comparison. The due diligence checklist that surfaces structural differences between vendors.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-ai-procurement-due-diligence-checklist</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-ai-procurement-due-diligence-checklist</guid>
      <pubDate>Thu, 19 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Deserialization Chains: Griffin AI vs Mythos]]></title>
      <description><![CDATA[CWE-502 deserialisation chains are the canonical stress test for AI bug hunters. Why Griffin AI's grounded synthesis finds real chains and Mythos-class scanners hallucinate them.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-deserialization-chains</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-deserialization-chains</guid>
      <pubDate>Thu, 19 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Triage Backlog Reduction: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A shrinking triage queue is the clearest sign a security programme is working. We explain why Griffin AI shrinks queues and Mythos-class tools grow them.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-triage-backlog-reduction</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-triage-backlog-reduction</guid>
      <pubDate>Thu, 19 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Fine-Tuned Open Weights for SecOps]]></title>
      <description><![CDATA[Fine-tuning an open-weight model sounds like a shortcut to a custom SecOps copilot. In practice, it is one step of a much longer journey.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-open-weight-fine-tuning-for-secops</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-open-weight-fine-tuning-for-secops</guid>
      <pubDate>Thu, 19 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Buy, Build, or Hybrid: Supply Chain Security in 2026]]></title>
      <description><![CDATA[The build-it-yourself era of supply chain security is ending. The full-stack vendor era has not arrived. The right architecture in 2026 is hybrid — and the decisions are different than they look.]]></description>
      <link>https://safeguard.sh/resources/blog/buy-build-hybrid-supply-chain-security-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/buy-build-hybrid-supply-chain-security-2026</guid>
      <pubDate>Thu, 19 Feb 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Defense Contractor IL7 Deployment Walkthrough]]></title>
      <description><![CDATA[An anonymized account of how a US defense prime deployed Safeguard.sh in an IL7 classified environment supporting a DoD mission system.]]></description>
      <link>https://safeguard.sh/resources/blog/customer-story-defense-contractor-il7-deployment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/customer-story-defense-contractor-il7-deployment</guid>
      <pubDate>Thu, 19 Feb 2026 10:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Getting Started: Safeguard Kubernetes Admission]]></title>
      <description><![CDATA[Deploy the Safeguard admission controller to block images with unresolved critical vulnerabilities before they run in your cluster.]]></description>
      <link>https://safeguard.sh/resources/blog/getting-started-safeguard-kubernetes-admission</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/getting-started-safeguard-kubernetes-admission</guid>
      <pubDate>Thu, 19 Feb 2026 10:00:00 GMT</pubDate>
      <category>Tutorials</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Multi-Cloud Software Supply Chain Abstractions]]></title>
      <description><![CDATA[Running supply chain controls across AWS, Azure, and GCP means picking the right abstractions. Here is which ones hold up and which ones you will regret.]]></description>
      <link>https://safeguard.sh/resources/blog/multi-cloud-software-supply-chain-abstractions</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/multi-cloud-software-supply-chain-abstractions</guid>
      <pubDate>Thu, 19 Feb 2026 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Top 10 Riskiest Transitive Dependencies 2026]]></title>
      <description><![CDATA[The Safeguard Research team built a risk index for transitive dependencies and ranked the ten categories that concentrate the most risk in modern stacks.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-research-top-10-riskiest-transitive-deps-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-research-top-10-riskiest-transitive-deps-2026</guid>
      <pubDate>Thu, 19 Feb 2026 09:00:00 GMT</pubDate>
      <category>Research</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Leakage Testing Methods For Security Benchmarks]]></title>
      <description><![CDATA[A benchmark that the model has seen in training is a benchmark of memorisation. Specific leakage-testing methods separate generalisation from recall.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-benchmark-leakage-testing-methods</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-benchmark-leakage-testing-methods</guid>
      <pubDate>Wed, 18 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Claude Desktop MCP for Security]]></title>
      <description><![CDATA[Claude Desktop's MCP support makes it a capable security tool. Griffin AI builds on that foundation rather than competing with it.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-claude-desktop-mcp-integration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-claude-desktop-mcp-integration</guid>
      <pubDate>Wed, 18 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Mythos: Architecture Deep Dive]]></title>
      <description><![CDATA[An architectural comparison of Griffin AI's engine-grounded reasoning stack against the pure-LLM pattern that Mythos-class products rely on.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-architecture-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-architecture-deep-dive</guid>
      <pubDate>Wed, 18 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[MCP Transport Layer Security Options]]></title>
      <description><![CDATA[MCP supports stdio, streamable HTTP, and a handful of experimental transports. Each has distinct security properties, and the choice of transport constrains every other security decision you make about the deployment.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-transport-layer-security-options</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-transport-layer-security-options</guid>
      <pubDate>Wed, 18 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Multi-Modal AI Supply Chain Considerations]]></title>
      <description><![CDATA[Multi-modal models bring image, audio, and video into the AI supply chain. Each modality introduces provenance and integrity challenges that text-only pipelines never had to face.]]></description>
      <link>https://safeguard.sh/resources/blog/multi-modal-ai-supply-chain-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/multi-modal-ai-supply-chain-considerations</guid>
      <pubDate>Wed, 18 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AI-Generated Dockerfile Vulnerability Patterns]]></title>
      <description><![CDATA[LLM-generated Dockerfiles repeat the same six or seven mistakes. Here is the pattern catalog and how to catch them before they ship.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-generated-dockerfile-vulnerability-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-generated-dockerfile-vulnerability-patterns</guid>
      <pubDate>Wed, 18 Feb 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cloud Supply Chain Security Across AWS, Azure, and GCP]]></title>
      <description><![CDATA[Each major cloud provider approaches supply chain security differently. Here's a practical comparison and what it means for multi-cloud organizations.]]></description>
      <link>https://safeguard.sh/resources/blog/cloud-supply-chain-security-aws-azure-gcp</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloud-supply-chain-security-aws-azure-gcp</guid>
      <pubDate>Wed, 18 Feb 2026 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[npm Slopsquat: The Hallucinated Package Risk in 2026]]></title>
      <description><![CDATA[Slopsquatting is the practice of registering package names that LLMs hallucinate, turning AI coding assistants into an accidental distribution channel.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-slopsquat-hallucinated-package-risk-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-slopsquat-hallucinated-package-risk-2026</guid>
      <pubDate>Wed, 18 Feb 2026 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard February 2026 Release Notes]]></title>
      <description><![CDATA[February 2026 at Safeguard.sh: Lino behavioral baselines, Eagle base image advisories, Griffin reachability for Rust, and a new workflow editor.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-changelog-february-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-changelog-february-2026</guid>
      <pubDate>Wed, 18 Feb 2026 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[YAML Deserialization Attacks: The Config File That Runs Code]]></title>
      <description><![CDATA[YAML's type system allows object instantiation during parsing. In many languages, this means a YAML file can execute arbitrary code.]]></description>
      <link>https://safeguard.sh/resources/blog/yaml-deserialization-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/yaml-deserialization-attacks</guid>
      <pubDate>Wed, 18 Feb 2026 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[NIST SSDF Audit: What Auditors Actually Check]]></title>
      <description><![CDATA[A practical walkthrough of what NIST Secure Software Development Framework audits look like in 2026, where evidence gaps show up, and how to prepare without burning out engineering.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-ssdf-secure-software-development-framework-audit</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-ssdf-secure-software-development-framework-audit</guid>
      <pubDate>Wed, 18 Feb 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs OpenAI Function Calling: Scoping]]></title>
      <description><![CDATA[Function calling gives models the ability to act. Acting safely on behalf of a specific user, in a specific context, within specific policy is a different problem.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-openai-function-calling-scoping</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-openai-function-calling-scoping</guid>
      <pubDate>Tue, 17 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[LLM Selection Cost-Quality Tradeoff For Security]]></title>
      <description><![CDATA[LLM selection is ultimately a cost-quality optimisation under workflow constraints. The curve is not smooth, and the right point on it depends on where errors land in your pipeline.]]></description>
      <link>https://safeguard.sh/resources/blog/llm-selection-cost-quality-tradeoff-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/llm-selection-cost-quality-tradeoff-security</guid>
      <pubDate>Tue, 17 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Black Basta Ransomware Leak Lessons Learned]]></title>
      <description><![CDATA[The Black Basta chat leak gave defenders a rare inside view of how a ransomware program operates. Here are the durable engineering lessons to take from it.]]></description>
      <link>https://safeguard.sh/resources/blog/blackbasta-ransomware-leak-lessons-learned</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/blackbasta-ransomware-leak-lessons-learned</guid>
      <pubDate>Tue, 17 Feb 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NuGet Package Signing Status in 2026]]></title>
      <description><![CDATA[NuGet package signing has quietly become one of the stricter supply chain stories in mainstream ecosystems. Here is what .NET teams actually need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/nuget-package-signing-microsoft-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nuget-package-signing-microsoft-2026</guid>
      <pubDate>Tue, 17 Feb 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Unbounded Output Space And Security Contracts]]></title>
      <description><![CDATA[A function whose output space is finite and enumerable can be secured by testing. A function whose output space is every string of tokens up to some length cannot. That difference quietly invalidates most classical security contracts.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-unbounded-output-space</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-unbounded-output-space</guid>
      <pubDate>Mon, 16 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Bring-Your-Own-Model: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Model lock-in is the quiet liability of pure-LLM vendors. Safeguard's bring-your-own-model story gives enterprises the option Mythos-class competitors cannot match.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-bring-your-own-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-bring-your-own-model</guid>
      <pubDate>Mon, 16 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Vertex AI Safety for Enterprise]]></title>
      <description><![CDATA[Vertex AI Safety is Google's approach to enterprise AI controls. For security-specific workflows, Griffin AI adds grounding the Safety layer doesn't.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-vertex-ai-safety-for-enterprise</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-vertex-ai-safety-for-enterprise</guid>
      <pubDate>Mon, 16 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FAQ: How Much Does Supply Chain Security Cost?]]></title>
      <description><![CDATA[Real numbers for supply chain security in 2026 — tool spend, headcount, hidden costs, SMB vs enterprise ranges, and where teams over- and under-invest.]]></description>
      <link>https://safeguard.sh/resources/blog/faq-how-much-does-supply-chain-security-cost-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/faq-how-much-does-supply-chain-security-cost-2026</guid>
      <pubDate>Mon, 16 Feb 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[KubeCon NA 2025: Supply Chain Security Themes]]></title>
      <description><![CDATA[KubeCon + CloudNativeCon NA 2025 put supply chain security at the center of the cloud-native conversation. Here is what mattered for platform teams.]]></description>
      <link>https://safeguard.sh/resources/blog/kubecon-na-2025-supply-chain-security-themes</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubecon-na-2025-supply-chain-security-themes</guid>
      <pubDate>Mon, 16 Feb 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Board-Level Supply Chain Security Reporting]]></title>
      <description><![CDATA[A practical template for reporting software supply chain risk to the board, including the three slides that work, the language that does not, and common traps.]]></description>
      <link>https://safeguard.sh/resources/blog/board-level-supply-chain-security-reporting</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/board-level-supply-chain-security-reporting</guid>
      <pubDate>Mon, 16 Feb 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[K8s RBAC Blast Radius in Supply Chain Attacks]]></title>
      <description><![CDATA[How Kubernetes RBAC determines what a supply chain attack can actually do once a compromised workload runs, and the RBAC patterns that meaningfully reduce blast radius.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-rbac-blast-radius-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-rbac-blast-radius-supply-chain</guid>
      <pubDate>Mon, 16 Feb 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[EU AI Act Enforcement: Year One Review]]></title>
      <description><![CDATA[The first enforcement window under the EU AI Act has closed. The actual pattern of enforcement looks different from the one vendors and advocacy groups predicted.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-eu-ai-act-enforcement-first-year</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-eu-ai-act-enforcement-first-year</guid>
      <pubDate>Sun, 15 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Patch Minimality: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A minimal patch is easier to review, safer to merge, and cheaper to roll back. Griffin AI enforces minimality; Mythos-class tools treat it as optional.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-patch-minimality</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-patch-minimality</guid>
      <pubDate>Sun, 15 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Rate-Limiting Patterns]]></title>
      <description><![CDATA[A practical look at rate-limiting patterns for Model Context Protocol servers, covering per-tool quotas, token budgets, burst control, and abuse-resistant designs.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-server-rate-limiting-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-server-rate-limiting-patterns</guid>
      <pubDate>Sun, 15 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Securing MCP Servers in the Enterprise: A Practical Guide]]></title>
      <description><![CDATA[MCP servers connect AI agents to your infrastructure. Here's how to secure them without killing the productivity gains.]]></description>
      <link>https://safeguard.sh/resources/blog/securing-mcp-servers-enterprise-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/securing-mcp-servers-enterprise-guide</guid>
      <pubDate>Sun, 15 Feb 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AI Models in Your Supply Chain: The Security Risks Nobody Talks About]]></title>
      <description><![CDATA[AI/ML models are the new open source libraries. Here's why your supply chain security strategy needs to account for model provenance, poisoning, and compliance.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-supply-chain-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-supply-chain-security-risks</guid>
      <pubDate>Sun, 15 Feb 2026 00:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Safeguard Team)</author>
    </item>
    <item>
      <title><![CDATA[Framework Routing Awareness: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Every HTTP vulnerability begins at a route. Griffin AI models routing; Mythos-class tools guess it. That difference shapes every downstream finding.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-framework-routing-awareness</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-framework-routing-awareness</guid>
      <pubDate>Sat, 14 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PCI DSS 4.0 Alignment: Griffin AI vs Mythos]]></title>
      <description><![CDATA[PCI DSS 4.0 raised the evidence bar for software security, supplier management, and continuous assurance. Griffin AI meets the new requirements with persisted records. Mythos-class pure-LLM tools leave QSAs asking for artifacts.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-pci-dss-4-alignment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-pci-dss-4-alignment</guid>
      <pubDate>Sat, 14 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Getting Started: Safeguard GitHub Actions Gate]]></title>
      <description><![CDATA[Set up the Safeguard GitHub Action to block risky pull requests on dependency vulnerabilities, license violations, and policy breaches before merge.]]></description>
      <link>https://safeguard.sh/resources/blog/getting-started-safeguard-github-actions-gate</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/getting-started-safeguard-github-actions-gate</guid>
      <pubDate>Sat, 14 Feb 2026 10:00:00 GMT</pubDate>
      <category>Tutorials</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GCP Artifact Analysis API for Vulnerability Triage]]></title>
      <description><![CDATA[GCP's Artifact Analysis API is the most direct way to get scan results into your triage tooling. Here is how to use it without drowning your team.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-artifact-analysis-api-vulnerability-triage</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-artifact-analysis-api-vulnerability-triage</guid>
      <pubDate>Sat, 14 Feb 2026 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Multi-Tenant Isolation for FedRAMP HIGH]]></title>
      <description><![CDATA[How Safeguard achieves hard multi-tenant isolation in a platform that meets FedRAMP HIGH — the boundaries, the proofs, and the trade-offs we accepted.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-multi-tenant-isolation-architecture-fedramp</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-multi-tenant-isolation-architecture-fedramp</guid>
      <pubDate>Sat, 14 Feb 2026 09:00:00 GMT</pubDate>
      <category>Architecture</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Security KPIs for Engineering Leaders]]></title>
      <description><![CDATA[If you cannot measure your supply chain security posture, you cannot invest in it. Here are the KPIs that separate real programs from the theater.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-kpis-for-engineering-leaders</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-kpis-for-engineering-leaders</guid>
      <pubDate>Sat, 14 Feb 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SLSA Provenance Consumption: Griffin AI vs Mythos]]></title>
      <description><![CDATA[SLSA provenance is the cryptographic receipt of a build. Griffin AI verifies it, parses it, and uses it as typed evidence. Mythos-class tools describe it and forget to check the signature.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-slsa-provenance-consumption</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-slsa-provenance-consumption</guid>
      <pubDate>Fri, 13 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Copilot Code Review Security: What It Misses]]></title>
      <description><![CDATA[Copilot's code review is useful. It is also not a security review, and treating it as one is how vulnerabilities ship. Here is what it actually catches.]]></description>
      <link>https://safeguard.sh/resources/blog/copilot-code-review-security-limitations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/copilot-code-review-security-limitations</guid>
      <pubDate>Fri, 13 Feb 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[LockBit Takedown: What Came After]]></title>
      <description><![CDATA[Operation Cronos disrupted LockBit's infrastructure but not the underlying affiliate economy. Here is what actually changed and what defenders should take from it into 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/lockbit-operational-takedown-aftermath</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lockbit-operational-takedown-aftermath</guid>
      <pubDate>Fri, 13 Feb 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Gold Expands to 6,000+ Artifacts]]></title>
      <description><![CDATA[The Gold Registry now carries 6,000+ curated zero-CVE packages and images across ten ecosystems. Here is what is in it, how it is built, and how to use it.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-gold-registry-expansion-6000-artifacts</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-gold-registry-expansion-6000-artifacts</guid>
      <pubDate>Fri, 13 Feb 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[debug/chalk npm Compromise Sept 2025: Deep Dive]]></title>
      <description><![CDATA[A phishing campaign against a prolific npm maintainer poisoned chalk, debug, and several other packages with a Web3 hijacker. Here is the full breakdown.]]></description>
      <link>https://safeguard.sh/resources/blog/debug-chalk-npm-compromise-sept-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/debug-chalk-npm-compromise-sept-2025</guid>
      <pubDate>Fri, 13 Feb 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cursor IDE Security Model: What Enterprises Need to Know]]></title>
      <description><![CDATA[Cursor's 2026 security model introduces privacy modes, indexing controls, and agent sandboxes. Here is the enterprise-ready view of what works.]]></description>
      <link>https://safeguard.sh/resources/blog/cursor-ide-security-model-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cursor-ide-security-model-2026</guid>
      <pubDate>Thu, 12 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Regression Gates: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Every release risks making the model worse. Griffin AI's regression gates block bad builds before they ship. Mythos-class tools rarely describe a gate process at all.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-regression-gates</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-regression-gates</guid>
      <pubDate>Thu, 12 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[XSS Variants: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Stored, reflected, DOM, mutation, and template-injection XSS each live in a different part of the application and demand a different analysis. Griffin's engine understands template contexts, framework escaping rules, and client-side sinks; Mythos reads HTML and hopes. The difference shows up the moment you leave textbook territory.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-xss-variants</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-xss-variants</guid>
      <pubDate>Thu, 12 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Reka Multimodal for Security]]></title>
      <description><![CDATA[Reka's multimodal models are interesting for specific security workflows. The question is whether multimodal is the binding constraint, and usually it isn't.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-reka-multimodal-security-use</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-reka-multimodal-security-use</guid>
      <pubDate>Thu, 12 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SaaS Vendor's EU CRA Readiness Sprint]]></title>
      <description><![CDATA[An anonymized account of how a mid-sized European SaaS vendor prepared for the EU Cyber Resilience Act using a focused 12-week Safeguard.sh readiness sprint.]]></description>
      <link>https://safeguard.sh/resources/blog/customer-story-saas-vendor-cra-readiness-sprint</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/customer-story-saas-vendor-cra-readiness-sprint</guid>
      <pubDate>Thu, 12 Feb 2026 10:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The End of CVSS-Only Prioritization]]></title>
      <description><![CDATA[A single static severity score cannot tell you which vulnerability to fix first. Modern prioritization is a function of reachability, exploitability, and business context — and CVSS is only one input.]]></description>
      <link>https://safeguard.sh/resources/blog/the-end-of-cvss-only-prioritization</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/the-end-of-cvss-only-prioritization</guid>
      <pubDate>Thu, 12 Feb 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Maven Central Sigstore Migration Status]]></title>
      <description><![CDATA[Maven Central's move from GPG to Sigstore is genuinely underway in 2026. Here is where the transition actually stands and what Java shops should do now.]]></description>
      <link>https://safeguard.sh/resources/blog/maven-central-sigstore-migration-status</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maven-central-sigstore-migration-status</guid>
      <pubDate>Thu, 12 Feb 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Code Assistant Package Hallucination Study]]></title>
      <description><![CDATA[The Safeguard Research team measured how often AI coding assistants hallucinate non-existent packages, how sticky those hallucinations are, and what defenders should do.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-research-ai-code-assistant-package-hallucination-study</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-research-ai-code-assistant-package-hallucination-study</guid>
      <pubDate>Thu, 12 Feb 2026 09:00:00 GMT</pubDate>
      <category>Research</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Sify Technology and US Enterprise Reach: What We're Evaluating]]></title>
      <description><![CDATA[A closer look at the enterprise accounts, verticals, and delivery capabilities that make Sify Technology (USA) an interesting partner for Safeguard.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-sify-technology-us-enterprise-reach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-sify-technology-us-enterprise-reach</guid>
      <pubDate>Thu, 12 Feb 2026 09:00:00 GMT</pubDate>
      <category>Company</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise AI Incident Response Playbooks]]></title>
      <description><![CDATA[AI incidents are not the same shape as traditional security incidents. The playbooks need to be specific to how AI systems actually fail.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-ai-incident-response-playbooks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-ai-incident-response-playbooks</guid>
      <pubDate>Wed, 11 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemma for Lightweight Scanning]]></title>
      <description><![CDATA[Gemma is built for efficiency. Can a small open-weight model replace Griffin AI for lightweight scanning workflows, or does the engine still matter?]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemma-for-lightweight-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemma-for-lightweight-scanning</guid>
      <pubDate>Wed, 11 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Engineer-Hour Savings: Griffin AI vs Mythos]]></title>
      <description><![CDATA[The real cost of a scanner is not the subscription. It is the engineer hours lost to false positives, bad remediations, and noisy queues. We do the math.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-engineer-hour-savings</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-engineer-hour-savings</guid>
      <pubDate>Wed, 11 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Novel Bug Class Detection: Griffin AI vs Mythos]]></title>
      <description><![CDATA[What happens when the bug does not match any known CWE? A study of how grounded and pure-LLM scanners perform on genuinely novel vulnerability patterns.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-novel-bug-class-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-novel-bug-class-detection</guid>
      <pubDate>Wed, 11 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Container Breakout Class Vulnerabilities 2024-2025]]></title>
      <description><![CDATA[A look at the container breakout vulnerabilities disclosed in 2024 and 2025, what they actually required to exploit, and what that pattern tells us about the defense model.]]></description>
      <link>https://safeguard.sh/resources/blog/container-breakout-class-vulnerabilities-2024-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-breakout-class-vulnerabilities-2024-2025</guid>
      <pubDate>Wed, 11 Feb 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[EU Cyber Resilience Act Enforcement Timeline 2026]]></title>
      <description><![CDATA[The EU Cyber Resilience Act is already biting in 2026. Here is the enforcement timeline manufacturers, integrators, and open source stewards need to internalize now.]]></description>
      <link>https://safeguard.sh/resources/blog/eu-cyber-resilience-act-enforcement-timeline-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eu-cyber-resilience-act-enforcement-timeline-2026</guid>
      <pubDate>Wed, 11 Feb 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[OpenVEX vs. CycloneDX VEX: Which to Pick]]></title>
      <description><![CDATA[A direct comparison of OpenVEX and CycloneDX VEX in 2026, covering spec differences, tooling support, and the operational tradeoffs that actually affect your choice.]]></description>
      <link>https://safeguard.sh/resources/blog/vex-openvex-vs-cyclonedx-vex-which-to-pick</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vex-openvex-vs-cyclonedx-vex-which-to-pick</guid>
      <pubDate>Wed, 11 Feb 2026 09:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[VMware ESXi CVE-2024-37085 Auth Bypass by Ransomware]]></title>
      <description><![CDATA[CVE-2024-37085 abuses ESXi's AD domain join to grant admin via a specially named group. Exploitation by Akira and Black Basta, detection, and fix.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-37085-vmware-esxi-auth-bypass</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-37085-vmware-esxi-auth-bypass</guid>
      <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Benchmark Contamination Concerns In Security Evals]]></title>
      <description><![CDATA[When the test set is in the training set, the benchmark is broken. Security eval contamination is widespread and the mitigations are specific.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-benchmark-contamination-concerns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-benchmark-contamination-concerns</guid>
      <pubDate>Tue, 10 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Claude Agent Skills for Security]]></title>
      <description><![CDATA[Anthropic's Claude Agent Skills let you package tools and context for Claude. Here's how that primitive compares to Griffin's security-specific workflow scaffolding.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-claude-agent-skills-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-claude-agent-skills-for-security</guid>
      <pubDate>Tue, 10 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Mythos: The Security Platform Comparison]]></title>
      <description><![CDATA[A senior engineer's side-by-side look at Griffin AI and Mythos — why engine-grounded reasoning beats pure-LLM security intuition when the audit clock starts.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-security-platform-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-security-platform-comparison</guid>
      <pubDate>Tue, 10 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FAQ: Building an AppSec Program From Scratch]]></title>
      <description><![CDATA[How to stand up an application security program from zero in 2026 — headcount, tooling, first 90 days, metrics, and the traps that waste the first year.]]></description>
      <link>https://safeguard.sh/resources/blog/faq-building-appsec-program-from-scratch-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/faq-building-appsec-program-from-scratch-2026</guid>
      <pubDate>Tue, 10 Feb 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Maven Central Malicious Publishing Trends 2025]]></title>
      <description><![CDATA[Maven Central has historically been the quietest major registry for malware, but 2025 saw a measurable uptick in malicious artifacts and namespace abuse.]]></description>
      <link>https://safeguard.sh/resources/blog/maven-central-malicious-publishing-trends-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maven-central-malicious-publishing-trends-2025</guid>
      <pubDate>Tue, 10 Feb 2026 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Azure ACR Image Signing with Notation Policy]]></title>
      <description><![CDATA[Azure Container Registry plus Notation gives you signing, trust policy, and AKS enforcement without bolting on Sigstore. Here is how the pieces actually fit together.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-acr-image-signing-notation-policy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-acr-image-signing-notation-policy</guid>
      <pubDate>Tue, 10 Feb 2026 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FIN7 Supply Chain Social Engineering (2024)]]></title>
      <description><![CDATA[FIN7 built tooling that made its social engineering feel like a SaaS product. Here is how its 2024 tradecraft blended malvertising, fake tools, and credential theft into a supply chain attack.]]></description>
      <link>https://safeguard.sh/resources/blog/fin7-supply-chain-social-engineering-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fin7-supply-chain-social-engineering-2024</guid>
      <pubDate>Tue, 10 Feb 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Reproducible Builds: Why Bother in 2026?]]></title>
      <description><![CDATA[Reproducible builds used to feel academic. After a decade of supply chain attacks, they are the shortest path from an SBOM to a verifiable artifact. Here is the case.]]></description>
      <link>https://safeguard.sh/resources/blog/reproducible-builds-why-bother-in-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/reproducible-builds-why-bother-in-2026</guid>
      <pubDate>Tue, 10 Feb 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Introducing Griffin AI v2: Context-Aware Security Intelligence]]></title>
      <description><![CDATA[Griffin AI v2 brings multi-step reasoning, remediation generation, and deep organizational context to Safeguard's AI engine.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-griffin-ai-v2-release</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-griffin-ai-v2-release</guid>
      <pubDate>Tue, 10 Feb 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs GPT-5: Context Grounding]]></title>
      <description><![CDATA[A million-token context window is a tool, not a solution. Context grounding for security requires architecture, not just capacity.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-5-context-grounding</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-5-context-grounding</guid>
      <pubDate>Mon, 09 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Evaluating Security-Specific Reasoning Models]]></title>
      <description><![CDATA[Reasoning models have arrived in security tooling. Evaluating them requires different methodology from evaluating classification or generation models. Here is what good evaluation looks like.]]></description>
      <link>https://safeguard.sh/resources/blog/security-specific-reasoning-model-evaluation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-specific-reasoning-model-evaluation</guid>
      <pubDate>Mon, 09 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Getting Started with Safeguard MCP + ChatGPT]]></title>
      <description><![CDATA[Expose the Safeguard MCP server to ChatGPT so the assistant can run live dependency scans and pull advisory data instead of guessing.]]></description>
      <link>https://safeguard.sh/resources/blog/getting-started-safeguard-mcp-with-chatgpt</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/getting-started-safeguard-mcp-with-chatgpt</guid>
      <pubDate>Mon, 09 Feb 2026 10:00:00 GMT</pubDate>
      <category>Tutorials</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[RSA Conference 2026: Supply Chain Themes]]></title>
      <description><![CDATA[RSA Conference 2026 centered on AI governance, software supply chain regulation, and vendor consolidation. Here is the analyst view of what mattered.]]></description>
      <link>https://safeguard.sh/resources/blog/rsa-conference-2026-supply-chain-themes</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rsa-conference-2026-supply-chain-themes</guid>
      <pubDate>Mon, 09 Feb 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Hiring Software Supply Chain Security Engineers]]></title>
      <description><![CDATA[What to screen for, how to structure interviews, and the signals that distinguish real supply chain security engineers from adjacent AppSec talent in 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/hiring-software-supply-chain-security-engineers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/hiring-software-supply-chain-security-engineers</guid>
      <pubDate>Mon, 09 Feb 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[xrpl.js npm Backdoor April 2025 Incident Analysis]]></title>
      <description><![CDATA[A stolen Ripple-adjacent npm token pushed key-stealing versions of xrpl.js. Timeline, payload structure, and what XRPL integrators should do next.]]></description>
      <link>https://safeguard.sh/resources/blog/xrpl-js-npm-backdoor-april-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xrpl-js-npm-backdoor-april-2025</guid>
      <pubDate>Mon, 09 Feb 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Tool-Call Privilege Escalation In Practice]]></title>
      <description><![CDATA[When an agent can call tools, the permission boundary is no longer between the user and the system. It is between the model's current beliefs and everything the model can reach. That is a much harder boundary to defend.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-tool-call-privilege-escalation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-tool-call-privilege-escalation</guid>
      <pubDate>Sun, 08 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemini Function Calling: Security]]></title>
      <description><![CDATA[Gemini's function calling is strong and flexible. Griffin AI's tool layer is narrow and opinionated. For security workflows, the opinionated approach wins.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-function-calling-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-function-calling-for-security</guid>
      <pubDate>Sun, 08 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[RBAC & Scoping: Griffin AI vs Mythos]]></title>
      <description><![CDATA[An AI that reads your security data needs the same access controls as a human analyst. Most pure-LLM vendors stop at the role name. Safeguard enforces the scope.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-rbac-and-scoping</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-rbac-and-scoping</guid>
      <pubDate>Sun, 08 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Multi-Tenant Isolation]]></title>
      <description><![CDATA[Practical guidance on isolating tenants on shared Model Context Protocol servers, covering identity, data, compute, and observability boundaries at production scale.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-server-multi-tenant-isolation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-server-multi-tenant-isolation</guid>
      <pubDate>Sun, 08 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Model Weights: Signing, Attestation, Provenance]]></title>
      <description><![CDATA[Model weights are binaries with the privilege of code and the review of documents. Here is what signing, attestation, and provenance should actually look like.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-model-weights-signing-attestation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-model-weights-signing-attestation</guid>
      <pubDate>Sun, 08 Feb 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GitLab OIDC Token Theft: Workflow Research]]></title>
      <description><![CDATA[GitLab CI OIDC tokens are becoming the keys to cloud kingdoms. Recent research shows how workflow misconfigurations leak them in surprising ways.]]></description>
      <link>https://safeguard.sh/resources/blog/gitlab-oidc-token-theft-workflow-research</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gitlab-oidc-token-theft-workflow-research</guid>
      <pubDate>Sun, 08 Feb 2026 10:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Enrichment and Vulnerability Correlation: Turning Inventory into Intelligence]]></title>
      <description><![CDATA[A raw SBOM is a parts list. An enriched SBOM is a risk assessment. Here's how to bridge the gap.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-enrichment-vulnerability-correlation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-enrichment-vulnerability-correlation</guid>
      <pubDate>Sun, 08 Feb 2026 10:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Policy Evaluation Engine]]></title>
      <description><![CDATA[How Safeguard's policy engine evaluates thousands of rules per artifact with predictable latency — the compiler, the cache layer, and the decision trail.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-policy-evaluation-engine-architecture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-policy-evaluation-engine-architecture</guid>
      <pubDate>Sun, 08 Feb 2026 09:00:00 GMT</pubDate>
      <category>Architecture</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI-BOM Adoption: State of the Art in 2026]]></title>
      <description><![CDATA[The AI Bill of Materials went from concept paper to procurement requirement in under two years. Here is what the current state of the art actually looks like.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-ai-bom-adoption-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-ai-bom-adoption-2026</guid>
      <pubDate>Sat, 07 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Fix Explanation Quality: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A remediation PR explanation is either evidence or storytelling. Griffin AI attaches taint paths and disproof attempts; Mythos-class tools attach plausible prose.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-fix-explanation-quality</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-fix-explanation-quality</guid>
      <pubDate>Sat, 07 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Go Module Checksum Database In Depth]]></title>
      <description><![CDATA[The Go checksum database is one of the most successful supply chain controls in any mainstream ecosystem. Here is how it actually works and where it still has edges.]]></description>
      <link>https://safeguard.sh/resources/blog/go-module-checksum-database-in-depth</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-module-checksum-database-in-depth</guid>
      <pubDate>Sat, 07 Feb 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Dynamic Dispatch: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Dynamic dispatch hides real exploits behind indirection. Griffin AI models the dispatch; Mythos-class tools guess. That gap changes outcomes.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-dynamic-dispatch-handling</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-dynamic-dispatch-handling</guid>
      <pubDate>Fri, 06 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Fargate/ECS Container Supply Chain Pitfalls]]></title>
      <description><![CDATA[The parts of container supply chain that break differently on AWS Fargate and ECS compared to Kubernetes, and what to do about each one in production.]]></description>
      <link>https://safeguard.sh/resources/blog/fargate-ecs-container-supply-chain-pitfalls</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fargate-ecs-container-supply-chain-pitfalls</guid>
      <pubDate>Fri, 06 Feb 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Gamaredon Ukraine Targeting Supply Chain 2025]]></title>
      <description><![CDATA[Gamaredon's 2025 operations against Ukraine have leaned harder into software and MSP supply chain pivots. Here is the tradecraft defenders need to recognize.]]></description>
      <link>https://safeguard.sh/resources/blog/gamaredon-ukraine-targeting-supply-chain-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gamaredon-ukraine-targeting-supply-chain-2025</guid>
      <pubDate>Fri, 06 Feb 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Lazarus Group: 3CX and Software Builds]]></title>
      <description><![CDATA[Lazarus turned a developer's personal machine into a corporate build-system compromise. Here is how that cascade actually worked and what it teaches about build-system trust.]]></description>
      <link>https://safeguard.sh/resources/blog/lazarus-group-3cx-and-software-builds</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lazarus-group-3cx-and-software-builds</guid>
      <pubDate>Fri, 06 Feb 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Secure Defaults for Internal Developer Platforms]]></title>
      <description><![CDATA[An IDP that makes the secure path the easy path wins. One that requires engineers to opt into security loses. Here is how to ship defaults that actually stick.]]></description>
      <link>https://safeguard.sh/resources/blog/secure-defaults-for-internal-developer-platforms</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/secure-defaults-for-internal-developer-platforms</guid>
      <pubDate>Fri, 06 Feb 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CUPS CVE-2024-47176: Network RCE via IPP]]></title>
      <description><![CDATA[CVE-2024-47176 in cups-browsed lets attackers add rogue printers over UDP 631 and chain to RCE. Exploit flow, detection, and Linux distro impact.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-47176-cups-network-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-47176-cups-network-rce</guid>
      <pubDate>Fri, 06 Feb 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[ISO 27001 Mapping: Griffin AI vs Mythos]]></title>
      <description><![CDATA[ISO 27001 Annex A has 93 controls in the 2022 revision, each needing documented evidence. Griffin AI emits records that map cleanly. Mythos-class pure-LLM tools force control owners to narrate.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-iso-27001-mapping</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-iso-27001-mapping</guid>
      <pubDate>Thu, 05 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[VEX Integration: Griffin AI vs Mythos]]></title>
      <description><![CDATA[VEX is how you turn a vulnerability list into an actionable work queue. Griffin AI ingests VEX documents as structured statements that filter findings at policy time. Mythos-class tools read them as advisory prose and lose the filtering entirely.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-vex-integration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-vex-integration</guid>
      <pubDate>Thu, 05 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[LLM Output Filtering as a Security Control]]></title>
      <description><![CDATA[Output filters are the last line before the user and the tool call. We cover when they work, when they fail, and how to measure them honestly in production.]]></description>
      <link>https://safeguard.sh/resources/blog/llm-output-filtering-as-security-control</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/llm-output-filtering-as-security-control</guid>
      <pubDate>Thu, 05 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Federal Agency FedRAMP Evidence Pack in 30 Days]]></title>
      <description><![CDATA[An anonymized look at how a US federal civilian agency assembled a complete FedRAMP High supply chain evidence pack in 30 days using Safeguard.sh.]]></description>
      <link>https://safeguard.sh/resources/blog/customer-story-federal-agency-fedramp-evidence-pack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/customer-story-federal-agency-fedramp-evidence-pack</guid>
      <pubDate>Thu, 05 Feb 2026 10:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[LLM Jailbreak as a Supply Chain Risk in 2026]]></title>
      <description><![CDATA[A jailbreak in a model you ship downstream is a supply chain incident, not a trivia item. Here is how to reason about it and where the defensive controls belong.]]></description>
      <link>https://safeguard.sh/resources/blog/llm-jailbreak-as-supply-chain-risk-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/llm-jailbreak-as-supply-chain-risk-2026</guid>
      <pubDate>Thu, 05 Feb 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM as a Product, Not a Checkbox]]></title>
      <description><![CDATA[Most SBOMs are generated, filed, and forgotten. Treating them as compliance artifacts rather than operational products is why they have not paid off — and how to fix it.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-as-a-product-not-a-checkbox-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-as-a-product-not-a-checkbox-2026</guid>
      <pubDate>Thu, 05 Feb 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Management Automation in 2026: Beyond Scanning]]></title>
      <description><![CDATA[Modern vulnerability management is shifting from periodic scanning to continuous, automated triage and remediation. Here's what that looks like in practice.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-management-automation-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-management-automation-2026</guid>
      <pubDate>Thu, 05 Feb 2026 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[AWS ECR Signing Policies with Notation]]></title>
      <description><![CDATA[ECR now supports Notation-based image signing and trust policy enforcement. Here is how to design signing policies that survive scale and auditors.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-ecr-signing-policies-notation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-ecr-signing-policies-notation</guid>
      <pubDate>Thu, 05 Feb 2026 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Abandoned Dependency Risk Study]]></title>
      <description><![CDATA[The Safeguard Research team measured how much abandonment exists in real dependency graphs, how it correlates with risk, and what to do about it.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-research-abandoned-dependency-risk-study</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-research-abandoned-dependency-risk-study</guid>
      <pubDate>Thu, 05 Feb 2026 09:00:00 GMT</pubDate>
      <category>Research</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Solana web3.js npm Backdoor: Dec 2024 Post-Mortem]]></title>
      <description><![CDATA[A phished maintainer token pushed a private-key-stealing backdoor into @solana/web3.js 1.95.6/1.95.7. Full mechanics and post-incident recommendations.]]></description>
      <link>https://safeguard.sh/resources/blog/solana-web3-js-npm-backdoor-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/solana-web3-js-npm-backdoor-2024</guid>
      <pubDate>Thu, 05 Feb 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Inflection Pi for Security Assistance]]></title>
      <description><![CDATA[]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-inflection-pi-for-security-assistance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-inflection-pi-for-security-assistance</guid>
      <pubDate>Wed, 04 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Path Traversal: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Path traversal is the vulnerability class that punishes lazy analysis. Framework-specific path normalisation, OS-dependent separators, symbolic link resolution, and archive extraction all hide exploitable gaps behind code that looks defensive. Griffin's engine resolves path operations with actual semantics; Mythos reads the variable name and calls it a day.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-path-traversal-cases</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-path-traversal-cases</guid>
      <pubDate>Wed, 04 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Refusal Rate Analysis: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A security AI that refuses too often is useless. One that refuses too rarely is dangerous. Griffin AI publishes calibrated refusal benchmarks; Mythos does not.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-refusal-rate-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-refusal-rate-analysis</guid>
      <pubDate>Wed, 04 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FAQ: CycloneDX vs SPDX — Which to Use?]]></title>
      <description><![CDATA[Practical answers to the most common CycloneDX vs SPDX questions: differences, tooling, regulatory preference, VEX support, and when to emit both.]]></description>
      <link>https://safeguard.sh/resources/blog/faq-sbom-format-choice-cyclonedx-vs-spdx</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/faq-sbom-format-choice-cyclonedx-vs-spdx</guid>
      <pubDate>Wed, 04 Feb 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Getting Started with Safeguard MCP + Claude Desktop]]></title>
      <description><![CDATA[Connect the Safeguard MCP server to Claude Desktop so your AI assistant can scan dependencies, read SBOMs, and suggest fixes grounded in real advisory data.]]></description>
      <link>https://safeguard.sh/resources/blog/getting-started-safeguard-mcp-with-claude-desktop</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/getting-started-safeguard-mcp-with-claude-desktop</guid>
      <pubDate>Wed, 04 Feb 2026 10:00:00 GMT</pubDate>
      <category>Tutorials</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Leaky Vessels: The runc Container Escape Class (2024)]]></title>
      <description><![CDATA[Leaky Vessels bundled four CVEs that let container processes escape into the host. Two years later the class is still mispatched and misunderstood.]]></description>
      <link>https://safeguard.sh/resources/blog/leaky-vessels-runc-container-escape-class-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/leaky-vessels-runc-container-escape-class-2024</guid>
      <pubDate>Wed, 04 Feb 2026 10:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Lino 2.0: Multi-Jurisdiction Compliance]]></title>
      <description><![CDATA[Lino 2.0 is Safeguard's compliance model. The 2.0 release adds multi-jurisdiction mapping, control-level evidence, and a new export for audit packages.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-lino-2-0-release-compliance-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-lino-2-0-release-compliance-model</guid>
      <pubDate>Wed, 04 Feb 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Ingestion at Scale: An Architecture Guide]]></title>
      <description><![CDATA[A pragmatic architecture for ingesting, normalizing, and querying hundreds of thousands of SBOMs across an enterprise or agency, without drowning in noise.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-ingestion-at-scale-architecture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-ingestion-at-scale-architecture</guid>
      <pubDate>Wed, 04 Feb 2026 09:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SEC Cyber Incident Disclosure Rule: Year Two]]></title>
      <description><![CDATA[Two years into Item 1.05 of Form 8-K, the SEC has clarified materiality, enforcement posture, and how Regulation S-K Item 106 cybersecurity narratives will be judged.]]></description>
      <link>https://safeguard.sh/resources/blog/sec-cybersecurity-incident-disclosure-rule-year-two</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sec-cybersecurity-incident-disclosure-rule-year-two</guid>
      <pubDate>Wed, 04 Feb 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[State of Vulnerability Management 2026 Report]]></title>
      <description><![CDATA[Where vulnerability management actually stands in 2026: KEV-driven prioritization, reachability, SLAs that hold, and the tools teams are consolidating onto.]]></description>
      <link>https://safeguard.sh/resources/blog/state-of-vulnerability-management-2026-report</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-of-vulnerability-management-2026-report</guid>
      <pubDate>Wed, 04 Feb 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise LLM Budget Management Patterns]]></title>
      <description><![CDATA[LLM spend forecasting is where finance teams meet AI engineering for the first time. The patterns that produce predictability are specific.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-llm-budget-management-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-llm-budget-management-patterns</guid>
      <pubDate>Tue, 03 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs DeepSeek Coder for Security Review]]></title>
      <description><![CDATA[DeepSeek Coder has become a favourite for code-focused workloads. This is how it compares to Griffin AI when the job is security review, not code generation.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-deepseek-coder-for-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-deepseek-coder-for-security-review</guid>
      <pubDate>Tue, 03 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Exploit Path Synthesis: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Finding a bug is not the same as proving it is exploitable. How Griffin AI synthesises concrete exploit paths and why pure-LLM scanners rarely get past the sketch stage.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-exploit-path-synthesis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-exploit-path-synthesis</guid>
      <pubDate>Tue, 03 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Throughput At Scale: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Engine work parallelises cleanly. Model calls do not. We explain why Griffin AI's throughput scales with CPU while Mythos-class tools bottleneck on rate limits.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-throughput-at-scale</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-throughput-at-scale</guid>
      <pubDate>Tue, 03 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[RAG Pipeline Supply Chain Attacks: Vector DBs and More]]></title>
      <description><![CDATA[RAG pipelines have six or seven supply chain surfaces, and most teams are only watching one. Here is how the attacks actually look in production.]]></description>
      <link>https://safeguard.sh/resources/blog/rag-pipeline-supply-chain-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rag-pipeline-supply-chain-attacks</guid>
      <pubDate>Tue, 03 Feb 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Automated Zero-Day Discovery: How AI Is Changing Vulnerability Research]]></title>
      <description><![CDATA[AI-powered fuzzing and code analysis are accelerating zero-day discovery. Here's what that means for defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/zero-day-discovery-automated-approaches</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zero-day-discovery-automated-approaches</guid>
      <pubDate>Tue, 03 Feb 2026 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[OCI + CNCF Image Supply Chain: 2026 Snapshot]]></title>
      <description><![CDATA[Where the OCI and CNCF image supply chain ecosystem actually sits in 2026, what has stabilized, what is still contested, and what to deploy now versus later.]]></description>
      <link>https://safeguard.sh/resources/blog/ocid-cncf-image-supply-chain-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ocid-cncf-image-supply-chain-2026</guid>
      <pubDate>Tue, 03 Feb 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SEvenLLM Design And Coverage]]></title>
      <description><![CDATA[SEvenLLM set out to measure how well LLMs handle Security Event analysis, the unglamorous day-to-day work of SOCs and IR teams. A design review of what the benchmark covers, how it was built, and where the coverage maps or does not map to real operations.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-benchmark-sevenllm-design</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-benchmark-sevenllm-design</guid>
      <pubDate>Mon, 02 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Claude Haiku for Bulk Scanning]]></title>
      <description><![CDATA[Claude Haiku is the cost-efficient model Griffin uses for high-volume scan interpretation. Here's how raw Haiku compares to Haiku inside Griffin's bulk pipeline.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-claude-haiku-for-bulk-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-claude-haiku-for-bulk-scanning</guid>
      <pubDate>Mon, 02 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[DEF CON 33 Software Supply Chain Sessions Recap]]></title>
      <description><![CDATA[DEF CON 33 brought hacker-energy attention to package ecosystems, CI/CD abuse, and AppSec Village. Here is what supply chain defenders should take home.]]></description>
      <link>https://safeguard.sh/resources/blog/defcon-33-recap-software-supply-chain-sessions</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/defcon-33-recap-software-supply-chain-sessions</guid>
      <pubDate>Mon, 02 Feb 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI mexalz Malware Campaign Deep Dive]]></title>
      <description><![CDATA[Researchers tracked a PyPI campaign publishing malicious packages under the mexalz and related account names, targeting Python developers with infostealers.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-mexalz-malware-campaign-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-mexalz-malware-campaign-deep-dive</guid>
      <pubDate>Mon, 02 Feb 2026 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Dev Container Security Posture (incl. Dotfiles)]]></title>
      <description><![CDATA[Dev containers promise reproducibility and isolation. They also pull in a long tail of scripts, dotfiles, and feature repos that most teams never audit. Here is how to fix that.]]></description>
      <link>https://safeguard.sh/resources/blog/dev-container-security-posture-dotfiles</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dev-container-security-posture-dotfiles</guid>
      <pubDate>Mon, 02 Feb 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Measuring AppSec Program Effectiveness in 2026]]></title>
      <description><![CDATA[The metrics that actually distinguish high-functioning application security programs from theater, with concrete formulas and reporting cadences for 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/measuring-appsec-program-effectiveness-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/measuring-appsec-program-effectiveness-2026</guid>
      <pubDate>Mon, 02 Feb 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[RansomHub Ransomware and EDR Bypass (2024)]]></title>
      <description><![CDATA[RansomHub absorbed affiliates displaced by BlackCat and ran one of the most prolific extortion operations of 2024. Here is what made its tradecraft effective and how to counter it.]]></description>
      <link>https://safeguard.sh/resources/blog/ransomhub-ransomware-edr-bypass-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ransomhub-ransomware-edr-bypass-2024</guid>
      <pubDate>Mon, 02 Feb 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Rust crates.io Supply Chain Controls in 2026]]></title>
      <description><![CDATA[crates.io has gained real supply chain features over the past two years. Here is an honest read on what works, what is still immature, and where to invest.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-crates-io-supply-chain-controls-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-crates-io-supply-chain-controls-2026</guid>
      <pubDate>Mon, 02 Feb 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Explores Partnership With Sify Technology (USA)]]></title>
      <description><![CDATA[Safeguard.sh is in early discussions with Sify Technology (USA) to evaluate a joint motion across network services, managed security, and enterprise reach.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-exploring-partnership-sify-technology-usa</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-exploring-partnership-sify-technology-usa</guid>
      <pubDate>Mon, 02 Feb 2026 09:00:00 GMT</pubDate>
      <category>Company</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin Agent Loop: Design Decisions]]></title>
      <description><![CDATA[The design rationale behind Griffin, Safeguard's triage agent — how the loop is structured, why we bounded reasoning depth, and how tool calls stay auditable.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-griffin-agent-loop-design</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-griffin-agent-loop-design</guid>
      <pubDate>Mon, 02 Feb 2026 09:00:00 GMT</pubDate>
      <category>Architecture</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Salt Typhoon Telecom Supply Chain Campaign 2024]]></title>
      <description><![CDATA[Salt Typhoon's 2024 intrusions into U.S. telecoms reframed supply chain risk as a routing and lawful-intercept problem. Here is what the campaign looked like from a defender's seat.]]></description>
      <link>https://safeguard.sh/resources/blog/salt-typhoon-telecom-supply-chain-campaign-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/salt-typhoon-telecom-supply-chain-campaign-2024</guid>
      <pubDate>Mon, 02 Feb 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SonicWall SMA 1000 CVE-2025-23006 Pre-Auth RCE]]></title>
      <description><![CDATA[CVE-2025-23006 is a pre-auth deserialization RCE in SonicWall SMA 1000. Exploit chain, detection signals, and appliance hardening.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2025-23006-sonicwall-sma-1000-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2025-23006-sonicwall-sma-1000-rce</guid>
      <pubDate>Mon, 02 Feb 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Audit Log Completeness: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Audit logs are where enterprise AI either proves its seriousness or exposes its improvisation. The gap between Griffin AI and Mythos-class products is visible in the first day of a real audit.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-audit-log-completeness</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-audit-log-completeness</guid>
      <pubDate>Sun, 01 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs OpenAI o1 for Security Reasoning]]></title>
      <description><![CDATA[Deep reasoning models are transformative for hard logical problems. Security reasoning is only partially a logic problem—the rest is grounding, policy, and workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-openai-o1-reasoning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-openai-o1-reasoning</guid>
      <pubDate>Sun, 01 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Small-Model Distillation For Security Workflows]]></title>
      <description><![CDATA[Distillation compresses the capability of a large model into a small one for a narrow task. For high-volume security workflows, it is often the difference between a working pipeline and an unaffordable one.]]></description>
      <link>https://safeguard.sh/resources/blog/small-model-distillation-for-security-workflows</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/small-model-distillation-for-security-workflows</guid>
      <pubDate>Sun, 01 Feb 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The Software Transparency Act of 2026: What It Means for the Industry]]></title>
      <description><![CDATA[Proposed legislation would require SBOMs for all critical infrastructure software. Here's a detailed analysis of the bill and its implications.]]></description>
      <link>https://safeguard.sh/resources/blog/software-transparency-act-2026-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-transparency-act-2026-analysis</guid>
      <pubDate>Sun, 01 Feb 2026 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[GCP Cloud Build + Workload Identity Federation]]></title>
      <description><![CDATA[Workload Identity Federation is the right way to give Cloud Build and external CI access to GCP. Here is the architecture, the traps, and the rollout plan.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-cloud-build-workload-identity-federation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-cloud-build-workload-identity-federation</guid>
      <pubDate>Sun, 01 Feb 2026 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Ledger Connect Kit Attack: What Devs Missed]]></title>
      <description><![CDATA[A phishing-obtained GitHub token published a wallet drainer as @ledgerhq/connect-kit in Dec 2023. What the incident tells us about Web3 supply chain trust.]]></description>
      <link>https://safeguard.sh/resources/blog/ledger-connect-kit-supply-chain-attack-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ledger-connect-kit-supply-chain-attack-2023</guid>
      <pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Training Data Opacity As A Trust Limit]]></title>
      <description><![CDATA[You cannot audit what you cannot see. Frontier model training corpora are effectively opaque to their users, and that opacity is not incidental. It shapes what kinds of trust you can extend to the outputs.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-training-data-opacity</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-training-data-opacity</guid>
      <pubDate>Sat, 31 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemini Long Context for Codebases]]></title>
      <description><![CDATA[Gemini's million-token context window is a genuinely new capability. For security analysis of large codebases, is it enough on its own?]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-long-context-for-codebases</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-long-context-for-codebases</guid>
      <pubDate>Sat, 31 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Human Review Burden: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Auto-remediation only scales if human review stays cheap. Griffin AI's grounded PRs keep reviewer time low; Mythos-class PRs push the cost back to humans.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-human-review-burden</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-human-review-burden</guid>
      <pubDate>Sat, 31 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Agent Security: Enterprise Adoption Patterns]]></title>
      <description><![CDATA[Enterprise agent deployments have moved past pilot phase. The security patterns that have survived contact with production look different from the ones the industry was selling a year ago.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-agent-security-enterprise-adoption</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-agent-security-enterprise-adoption</guid>
      <pubDate>Fri, 30 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Claude Code Coding Agent: Security Posture Review]]></title>
      <description><![CDATA[A working review of Claude Code's security posture, sandboxing model, and the practical controls enterprises need to deploy it safely at scale.]]></description>
      <link>https://safeguard.sh/resources/blog/claude-code-coding-agent-security-posture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/claude-code-coding-agent-security-posture</guid>
      <pubDate>Fri, 30 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Cross-Package Analysis: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Real exploits cross package boundaries. Griffin AI's graph follows them; Mythos-class tools often stop at the file they are reading.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cross-package-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cross-package-analysis</guid>
      <pubDate>Fri, 30 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CISO FAQ: Software Supply Chain Security 2026]]></title>
      <description><![CDATA[The questions CISOs actually ask about software supply chain security in 2026: scope, budget, reporting lines, SBOMs, AI code, and where to start.]]></description>
      <link>https://safeguard.sh/resources/blog/faq-software-supply-chain-security-for-cisos-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/faq-software-supply-chain-security-for-cisos-2026</guid>
      <pubDate>Fri, 30 Jan 2026 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Getting Started with Safeguard CLI: Your First Scan]]></title>
      <description><![CDATA[Install the Safeguard CLI, authenticate, and run your first dependency and SBOM scan in under ten minutes. Covers config, output formats, and CI wiring.]]></description>
      <link>https://safeguard.sh/resources/blog/getting-started-safeguard-cli-first-scan</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/getting-started-safeguard-cli-first-scan</guid>
      <pubDate>Fri, 30 Jan 2026 10:00:00 GMT</pubDate>
      <category>Tutorials</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Sigstore Policy Controller for K8s in Production]]></title>
      <description><![CDATA[How the Sigstore Policy Controller actually runs in production, what it does better than Kyverno, and the operational pitfalls nobody mentions in the quickstart.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-supply-chain-sigstore-policy-controller</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-supply-chain-sigstore-policy-controller</guid>
      <pubDate>Fri, 30 Jan 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Scattered Spider: Identity as Supply Chain 2024-25]]></title>
      <description><![CDATA[Scattered Spider showed that help-desk processes, SaaS federation, and MSPs are the new software supply chain. Here is how to think about it and what to actually change.]]></description>
      <link>https://safeguard.sh/resources/blog/scattered-spider-identity-supply-chain-2024-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/scattered-spider-identity-supply-chain-2024-2025</guid>
      <pubDate>Fri, 30 Jan 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[State of SBOM Adoption Across Industries 2026]]></title>
      <description><![CDATA[How SBOM adoption differs across finance, healthcare, public sector, manufacturing, and tech in 2026, where the real operational usage is, and where it stalls.]]></description>
      <link>https://safeguard.sh/resources/blog/state-of-sbom-adoption-across-industries-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-of-sbom-adoption-across-industries-2026</guid>
      <pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI-BOM Awareness: Griffin AI vs Mythos]]></title>
      <description><![CDATA[AI-BOM is how you describe an AI system's supply chain — models, datasets, prompts, inference environments. Griffin AI ingests it as structured inventory. Mythos-class tools try to talk about AI while remaining blind to the AI systems they describe.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-ai-bom-awareness</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-ai-bom-awareness</guid>
      <pubDate>Thu, 29 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SOC 2 Type II Evidence: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A SOC 2 Type II auditor samples a control population across a reporting period. Griffin AI creates that population as a natural output. Mythos-class pure-LLM tools leave you reconstructing it.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-soc2-type2-evidence</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-soc2-type2-evidence</guid>
      <pubDate>Thu, 29 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AI Model Weight Tampering Detection Techniques]]></title>
      <description><![CDATA[Weight-level tampering leaves cryptographic and statistical fingerprints. Here is what current research says about detecting a modified checkpoint before it reaches inference.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-model-weight-tampering-detection-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-model-weight-tampering-detection-techniques</guid>
      <pubDate>Thu, 29 Jan 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FinTech Cuts CVE Noise 80% With Reachability]]></title>
      <description><![CDATA[An anonymized story of how a high-growth payments FinTech slashed vulnerability backlog noise by 80% using Safeguard.sh's reachability analysis.]]></description>
      <link>https://safeguard.sh/resources/blog/customer-story-fintech-80-percent-cve-noise-cut</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/customer-story-fintech-80-percent-cve-noise-cut</guid>
      <pubDate>Thu, 29 Jan 2026 10:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Sandboxing LLM Agent Code Execution: Patterns]]></title>
      <description><![CDATA[If your agent can execute code, something it reads from the internet can execute code. Pick your sandbox before the agent picks one for you.]]></description>
      <link>https://safeguard.sh/resources/blog/llm-agent-code-execution-sandboxing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/llm-agent-code-execution-sandboxing</guid>
      <pubDate>Thu, 29 Jan 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Case for Autonomous Remediation Now]]></title>
      <description><![CDATA[Manual patching is a losing race against the rate of new vulnerabilities. Autonomous remediation is not a future technology — it is the only workflow that keeps pace with modern supply chains.]]></description>
      <link>https://safeguard.sh/resources/blog/the-case-for-autonomous-remediation-now</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/the-case-for-autonomous-remediation-now</guid>
      <pubDate>Thu, 29 Jan 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Reachability Noise Reduction: Findings]]></title>
      <description><![CDATA[The Safeguard Research team ran reachability analysis across a large corpus of real codebases. This is what we learned about which CVEs actually matter.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-research-reachability-noise-reduction-findings</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-research-reachability-noise-reduction-findings</guid>
      <pubDate>Thu, 29 Jan 2026 09:00:00 GMT</pubDate>
      <category>Research</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[ScreenConnect CVE-2024-57727 Path Traversal Detailed]]></title>
      <description><![CDATA[CVE-2024-57727 is a path traversal in ConnectWise ScreenConnect enabling arbitrary file read on self-hosted instances. Chain, detection, and patching.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-57727-screenconnect-path-traversal</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-57727-screenconnect-path-traversal</guid>
      <pubDate>Thu, 29 Jan 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Citation Accuracy: Griffin AI vs Mythos]]></title>
      <description><![CDATA[An AI security tool that cites the wrong advisory is worse than one that says nothing. Griffin AI benchmarks citation accuracy at 0.89 similarity; Mythos does not.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-citation-accuracy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-citation-accuracy</guid>
      <pubDate>Wed, 28 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SSRF Detection: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Server-side request forgery is a test of how well your scanner understands the boundary between trusted and untrusted URLs. Griffin's engine resolves URL construction through string builders, template engines, and HTTP client configuration; Mythos reads the code and guesses. On modern applications that is the difference between a finding you can ship and a finding you cannot defend.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-ssrf-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-ssrf-detection</guid>
      <pubDate>Wed, 28 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Capability Declaration Audit]]></title>
      <description><![CDATA[An MCP server tells the world what it can do through its capability declaration. Auditing those declarations catches drift, tool poisoning, and misconfiguration before an agent gets talked into using the wrong one.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-server-capability-declaration-audit</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-server-capability-declaration-audit</guid>
      <pubDate>Wed, 28 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Black Hat USA 2025: Supply Chain Security Recap]]></title>
      <description><![CDATA[Black Hat USA 2025 highlighted AI-generated code risks, build system attacks, and the maturation of SBOM tooling. Here is what mattered for supply chain teams.]]></description>
      <link>https://safeguard.sh/resources/blog/black-hat-usa-2025-supply-chain-security-recap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/black-hat-usa-2025-supply-chain-security-recap</guid>
      <pubDate>Wed, 28 Jan 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard January 2026 Release Notes]]></title>
      <description><![CDATA[January 2026 release notes from Safeguard.sh: Lino runtime attestations, Griffin cache sharing, self-healing workflows, and runner fleet mode.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-changelog-january-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-changelog-january-2026</guid>
      <pubDate>Wed, 28 Jan 2026 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CISA Secure by Design Pledge: Signatories in 2026]]></title>
      <description><![CDATA[CISA's Secure by Design Pledge has crossed 300 signatories. Here is what the 2026 cohort is committing to, what regulators expect in return, and how to prove it.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-secure-by-design-pledge-signatories-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-secure-by-design-pledge-signatories-2026</guid>
      <pubDate>Wed, 28 Jan 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FDA Premarket Cybersecurity SBOM in 2026]]></title>
      <description><![CDATA[What the FDA's 2026 premarket cybersecurity guidance actually requires for SBOMs, how reviewers evaluate them, and the patterns that cause 510(k) submissions to stall.]]></description>
      <link>https://safeguard.sh/resources/blog/fda-premarket-cybersecurity-sbom-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fda-premarket-cybersecurity-sbom-2026</guid>
      <pubDate>Wed, 28 Jan 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Trusted Publishing Common Pitfalls]]></title>
      <description><![CDATA[PyPI trusted publishing removed a whole class of token leaks, but teams keep tripping over the same half-dozen configuration mistakes. Here is what to watch for.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-trusted-publishing-common-pitfalls</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-trusted-publishing-common-pitfalls</guid>
      <pubDate>Wed, 28 Jan 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Gold Build Pipeline: How It Works]]></title>
      <description><![CDATA[A walkthrough of the Gold Build pipeline that produces reproducible, attested, policy-verified container images and binaries for Safeguard customers.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-gold-build-pipeline-how-it-works</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-gold-build-pipeline-how-it-works</guid>
      <pubDate>Wed, 28 Jan 2026 09:00:00 GMT</pubDate>
      <category>Architecture</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Review in Pull Request Workflows]]></title>
      <description><![CDATA[An SBOM that arrives after merge is a compliance artifact. An SBOM that shows up in the PR is a security control. Here is how to wire it up without killing velocity.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-in-pull-request-workflows-practical</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-in-pull-request-workflows-practical</guid>
      <pubDate>Wed, 28 Jan 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Rspack npm Account Takeover: 2024 Incident Analysis]]></title>
      <description><![CDATA[Compromised npm tokens pushed crypto-miner versions of @rspack/core and @rspack/cli in December 2024. Timeline, payload, and what downstream teams missed.]]></description>
      <link>https://safeguard.sh/resources/blog/rspack-npm-account-takeover-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rspack-npm-account-takeover-2024</guid>
      <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs AI21 Jurassic for Security Workflows]]></title>
      <description><![CDATA[]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-ai21-jurassic-security-workflows</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-ai21-jurassic-security-workflows</guid>
      <pubDate>Tue, 27 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cache Hit Optimisation: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Prompt caching and engine memoisation combine to make Griffin AI scans repeat-cheap. Pure-LLM tools recompute the same reasoning on every run.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cache-hit-optimisation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cache-hit-optimisation</guid>
      <pubDate>Tue, 27 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Azure DevOps Supply Chain Hardening Guide]]></title>
      <description><![CDATA[A senior engineer's 2026 playbook for hardening Azure DevOps against the supply chain attacks that actually happen: extensions, service connections, and template injection.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-devops-supply-chain-hardening-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-devops-supply-chain-hardening-guide</guid>
      <pubDate>Tue, 27 Jan 2026 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise RAG Security Rollout Antipatterns]]></title>
      <description><![CDATA[Retrieval-augmented generation systems are where enterprise AI meets enterprise data, and where most security rollouts stumble. A catalog of the antipatterns we keep seeing.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-rag-security-rollout-antipatterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-rag-security-rollout-antipatterns</guid>
      <pubDate>Mon, 26 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CWE Classification Accuracy: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Getting the CWE right is not a taxonomic hobby. It drives remediation, compliance mapping, and detection engineering. Here is how grounded and pure-LLM scanners compare.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cwe-classification-accuracy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cwe-classification-accuracy</guid>
      <pubDate>Mon, 26 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Qwen for Code Security]]></title>
      <description><![CDATA[Qwen's open-weight models have strong code benchmarks. We dig into how they compare to Griffin AI when the workflow is real code security, not just leetcode.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-qwen-for-code-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-qwen-for-code-security</guid>
      <pubDate>Mon, 26 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cilium Tetragon Runtime Security with eBPF]]></title>
      <description><![CDATA[A practical look at Cilium Tetragon for Kubernetes runtime security, what eBPF gives you that audit logs do not, and where Tetragon fits in a real stack.]]></description>
      <link>https://safeguard.sh/resources/blog/cilium-tetragon-runtime-security-ebpf</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cilium-tetragon-runtime-security-ebpf</guid>
      <pubDate>Mon, 26 Jan 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Build a Software Supply Chain Program in 90 Days]]></title>
      <description><![CDATA[A pragmatic, phase-by-phase blueprint for standing up a credible software supply chain security program inside a single fiscal quarter without boiling the ocean.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-build-a-software-supply-chain-program-90-days</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-build-a-software-supply-chain-program-90-days</guid>
      <pubDate>Mon, 26 Jan 2026 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SecBench Methodology Reviewed]]></title>
      <description><![CDATA[SecBench positioned itself as a comprehensive cybersecurity knowledge and reasoning benchmark for LLMs. A methodology review of its construction, scoring, and the gaps that separate the advertised coverage from what the benchmark actually exercises.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-benchmark-secbench-methodology</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-benchmark-secbench-methodology</guid>
      <pubDate>Sun, 25 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Claude Sonnet for Remediation]]></title>
      <description><![CDATA[Claude Sonnet is the workhorse model Griffin leans on for remediation. Here's how raw Sonnet compares to Sonnet inside Griffin's remediation pipeline.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-claude-sonnet-for-remediation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-claude-sonnet-for-remediation</guid>
      <pubDate>Sun, 25 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Data Residency Controls: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Data residency is no longer a procurement checkbox. It is an architectural property that most pure-LLM vendors cannot deliver without major rework.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-data-residency-controls</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-data-residency-controls</guid>
      <pubDate>Sun, 25 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CISA SBOM Mandate Enforcement Begins: What Federal Contractors Need to Know]]></title>
      <description><![CDATA[CISA is moving from SBOM guidance to enforcement in 2026. Here's what the mandate requires and how to prepare.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-sbom-mandate-enforcement-begins</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-sbom-mandate-enforcement-begins</guid>
      <pubDate>Sun, 25 Jan 2026 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Getting Started with Safeguard IDE Extension (VS Code)]]></title>
      <description><![CDATA[A step-by-step walkthrough for installing, configuring, and using the Safeguard VS Code extension to catch supply chain issues before you commit.]]></description>
      <link>https://safeguard.sh/resources/blog/getting-started-safeguard-ide-extension-vscode</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/getting-started-safeguard-ide-extension-vscode</guid>
      <pubDate>Sun, 25 Jan 2026 10:00:00 GMT</pubDate>
      <category>Tutorials</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Windows LDAP LSASS CVE-2024-49113 (LDAPNightmare)]]></title>
      <description><![CDATA[CVE-2024-49113 crashes LSASS over LDAP referrals and pairs with CVE-2024-49112 for RCE. Exploit chain, detection, and domain controller hardening.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-49113-windows-ldap-lsass-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-49113-windows-ldap-lsass-rce</guid>
      <pubDate>Sun, 25 Jan 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[State of Software Supply Chain Security 2026]]></title>
      <description><![CDATA[A senior-engineer view of where software supply chain security stands in 2026: what's changed, what's stuck, and where budgets, regulations, and attacker tactics converge.]]></description>
      <link>https://safeguard.sh/resources/blog/state-of-software-supply-chain-security-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-of-software-supply-chain-security-2026</guid>
      <pubDate>Sun, 25 Jan 2026 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Domain-Adapted LLMs For Vulnerability Detection in 2026]]></title>
      <description><![CDATA[Domain adaptation has quietly become the default for LLM-assisted vulnerability detection. A look at what works in 2026, what does not, and what teams should plan for next.]]></description>
      <link>https://safeguard.sh/resources/blog/domain-adapted-llm-vulnerability-detection-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/domain-adapted-llm-vulnerability-detection-2026</guid>
      <pubDate>Sat, 24 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs GPT-4o: Security Limits Exposed]]></title>
      <description><![CDATA[GPT-4o is an excellent general-purpose model. Security workflows are a specialty, and specialty work exposes the limits of general intelligence.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-4o-security-limits</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-4o-security-limits</guid>
      <pubDate>Sat, 24 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Regression Testing on Fixes: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A remediation PR is only useful if it does not break anything else. Griffin AI runs targeted regression before opening; Mythos-class tools usually do not.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-regression-testing-on-fixes</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-regression-testing-on-fixes</guid>
      <pubDate>Sat, 24 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Prompt Injection as a Supply Chain Risk in 2026]]></title>
      <description><![CDATA[Prompt injection stopped being an LLM curiosity the moment agents started committing code. It is now a software supply chain risk and should be modeled as one.]]></description>
      <link>https://safeguard.sh/resources/blog/prompt-injection-supply-chain-risk-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/prompt-injection-supply-chain-risk-2026</guid>
      <pubDate>Sat, 24 Jan 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Actions: SHA-Pin Tags or Get Burned]]></title>
      <description><![CDATA[Tag-pinning Actions feels fine until a maintainer gets compromised. Here is why SHA-pinning is the only serious option in 2026 and how to operationalize it.]]></description>
      <link>https://safeguard.sh/resources/blog/github-actions-pinning-sha-vs-tag</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-actions-pinning-sha-vs-tag</guid>
      <pubDate>Sat, 24 Jan 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Eagle 3.0 Release: Classifier Update]]></title>
      <description><![CDATA[Eagle 3.0 is the classification model behind Safeguard's package, image, and secret detection. Here is what changed, what moved, and what it means for alerts.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-eagle-3-0-release-malware-classifier</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-eagle-3-0-release-malware-classifier</guid>
      <pubDate>Sat, 24 Jan 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Instruction/Data Conflation: Why Prompt Injection Persists]]></title>
      <description><![CDATA[Prompt injection is not a vulnerability that will be patched. It is what happens when a system cannot distinguish the instructions it is supposed to follow from the data it is supposed to process.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-instruction-data-conflation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-instruction-data-conflation</guid>
      <pubDate>Fri, 23 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemini Code Assist: Security]]></title>
      <description><![CDATA[Gemini Code Assist makes developers faster. But faster is not safer. Here's how Griffin AI layers a security engine onto the same developer workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-code-assist-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-code-assist-for-security</guid>
      <pubDate>Fri, 23 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SPDX Coverage: Griffin AI vs Mythos]]></title>
      <description><![CDATA[SPDX is the format auditors ask for, the format regulators reference, and the format most enterprise procurement teams standardize on. Griffin AI treats it as a first-class graph. Mythos-class tools treat it as a long document.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-spdx-coverage</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-spdx-coverage</guid>
      <pubDate>Fri, 23 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Clop/Cl0p Supply Chain Exploitation Patterns]]></title>
      <description><![CDATA[Clop has industrialized third-party file-transfer exploitation. Here is how the group operates, what it keeps repeating, and how defenders can stop repeating their own mistakes.]]></description>
      <link>https://safeguard.sh/resources/blog/clop-cl0p-supply-chain-exploitation-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/clop-cl0p-supply-chain-exploitation-patterns</guid>
      <pubDate>Fri, 23 Jan 2026 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Knowledge Graph Architecture]]></title>
      <description><![CDATA[How Safeguard's knowledge graph unifies components, vulnerabilities, policies, and runtime evidence into a single queryable substrate that powers every product surface.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-knowledge-graph-architecture-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-knowledge-graph-architecture-deep-dive</guid>
      <pubDate>Fri, 23 Jan 2026 09:00:00 GMT</pubDate>
      <category>Architecture</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Polyfill.io CDN Supply Chain Attack: 100K+ Sites]]></title>
      <description><![CDATA[After a domain handover, polyfill.io began serving malware to more than 100,000 sites. Here is the attack chain and what the incident teaches us.]]></description>
      <link>https://safeguard.sh/resources/blog/polyfill-io-cdn-supply-chain-attack-june-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/polyfill-io-cdn-supply-chain-attack-june-2024</guid>
      <pubDate>Fri, 23 Jan 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MCP Ecosystem Maturation: Where It's Going]]></title>
      <description><![CDATA[The Model Context Protocol went from a single-vendor proposal to a multi-implementation standard in under eighteen months. The security implications are still being worked out in public.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-mcp-ecosystem-maturation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-mcp-ecosystem-maturation</guid>
      <pubDate>Thu, 22 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FedRAMP HIGH Posture: Griffin AI vs Mythos]]></title>
      <description><![CDATA[FedRAMP HIGH demands 421 controls with documented, continuous evidence. Griffin AI produces control-mapped records every day. Mythos-class pure-LLM tools cannot fill a 3PAO evidence package.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-fedramp-high-posture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-fedramp-high-posture</guid>
      <pubDate>Thu, 22 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Taint Propagation: Griffin AI vs Mythos Approaches]]></title>
      <description><![CDATA[Taint tells you whether attacker data actually reaches a sink. Griffin AI propagates it; Mythos-class tools infer it. The difference shows up fast.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-taint-propagation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-taint-propagation</guid>
      <pubDate>Thu, 22 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Discovery Protocol Security]]></title>
      <description><![CDATA[MCP server discovery turns a client connection string into a live capability graph. The protocol mechanics that make this convenient also widen the blast radius when discovery is spoofed, tampered with, or silently reshaped mid-session.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-server-discovery-protocol-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-server-discovery-protocol-security</guid>
      <pubDate>Thu, 22 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[A Healthcare System's Self-Healing Container Rollout]]></title>
      <description><![CDATA[An anonymized account of how a regional North American healthcare system deployed Safeguard's self-healing container base images across 600+ workloads.]]></description>
      <link>https://safeguard.sh/resources/blog/customer-story-healthcare-system-self-healing-containers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/customer-story-healthcare-system-self-healing-containers</guid>
      <pubDate>Thu, 22 Jan 2026 10:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Hugging Face Pickle Backdoor Research 2025]]></title>
      <description><![CDATA[Pickle-serialized model files remain a live attack surface on Hugging Face. Here is what 2025 research disclosed about persistent backdoors and what defenders should do about it.]]></description>
      <link>https://safeguard.sh/resources/blog/huggingface-pickle-backdoor-research-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/huggingface-pickle-backdoor-research-2025</guid>
      <pubDate>Thu, 22 Jan 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Next-Generation Software Composition Analysis: Beyond Dependency Lists]]></title>
      <description><![CDATA[Traditional SCA tools tell you what's in your software. Next-gen SCA tells you what matters. Here's how the category is evolving.]]></description>
      <link>https://safeguard.sh/resources/blog/software-composition-analysis-next-generation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-composition-analysis-next-generation</guid>
      <pubDate>Thu, 22 Jan 2026 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Why Scanning Alone Doesn't Work Anymore]]></title>
      <description><![CDATA[Scanners generate findings. Programs produce outcomes. After a decade of dashboards and CVE counts, it is time to admit the gap between the two is the actual security problem.]]></description>
      <link>https://safeguard.sh/resources/blog/why-scanning-alone-does-not-work-anymore-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/why-scanning-alone-does-not-work-anymore-2026</guid>
      <pubDate>Thu, 22 Jan 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AWS CodeBuild/CodePipeline Hardening in 2026]]></title>
      <description><![CDATA[CodeBuild and CodePipeline still carry the biggest AWS supply chain blast radius per dollar. Here is how to harden them in 2026 without rewriting to a different CI.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-codebuild-codepipeline-hardening-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-codebuild-codepipeline-hardening-2026</guid>
      <pubDate>Thu, 22 Jan 2026 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cosign for Container Signing: A Production Setup]]></title>
      <description><![CDATA[A working production setup for Cosign image signing across CI, registries, and Kubernetes admission, including the parts that break at scale and how to recover.]]></description>
      <link>https://safeguard.sh/resources/blog/container-image-signing-with-cosign-production</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-image-signing-with-cosign-production</guid>
      <pubDate>Thu, 22 Jan 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[npm Provenance Statements in Practice (2026)]]></title>
      <description><![CDATA[A practical look at npm provenance in 2026: what statements prove, how to publish them from CI, and where they quietly fail when teams treat them as magic.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-provenance-statements-practical-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-provenance-statements-practical-2026</guid>
      <pubDate>Thu, 22 Jan 2026 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[OSS Malware Trends Q1 2026 (Safeguard Research)]]></title>
      <description><![CDATA[The Safeguard Research team analyzed first-quarter 2026 malicious package telemetry across npm, PyPI, RubyGems, and crates.io. Here is what the data shows.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-research-oss-malware-trends-q1-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-research-oss-malware-trends-q1-2026</guid>
      <pubDate>Thu, 22 Jan 2026 09:00:00 GMT</pubDate>
      <category>Research</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Tech-D Cybersecurity: A Joint Opportunity Under Review]]></title>
      <description><![CDATA[A deeper look at the commercial and technical thesis behind Safeguard's exploratory partnership discussions with Tech-D Cybersecurity Ltd.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-tech-d-cybersecurity-joint-opportunity</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-tech-d-cybersecurity-joint-opportunity</guid>
      <pubDate>Thu, 22 Jan 2026 09:00:00 GMT</pubDate>
      <category>Company</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Adversarial Resistance: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Griffin AI reports 98-100% hold rate against adversarial probes. Most Mythos-class tools have never published an adversarial number at all.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-adversarial-resistance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-adversarial-resistance</guid>
      <pubDate>Wed, 21 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CISA Secure by Design Pledge: Practical Impact]]></title>
      <description><![CDATA[An engineer's assessment of what the CISA Secure by Design Pledge actually changed inside product teams, what it did not, and where the 2026 expectations are landing.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-secure-by-design-pledge-practical-impact</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-secure-by-design-pledge-practical-impact</guid>
      <pubDate>Wed, 21 Jan 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Veeam Backup CVE-2024-40711 Unauth RCE Walkthrough]]></title>
      <description><![CDATA[CVE-2024-40711 is a critical unauth RCE in Veeam Backup & Replication. Deserialization flaw, exploit chain, and ransomware operator abuse.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-40711-veeam-backup-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-40711-veeam-backup-rce</guid>
      <pubDate>Wed, 21 Jan 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Deserialization Vulnerabilities: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Unsafe deserialization looks obvious on a slide and impossible on a real codebase. Sinks are language-specific, gadgets live in third-party libraries, and the tainted byte can arrive wrapped in six layers of framework ceremony. Griffin's engine-plus-LLM design handles each of those concerns separately; Mythos-style pure-LLM scanners blur them into pattern-matching.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-deserialization-vulns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-deserialization-vulns</guid>
      <pubDate>Tue, 20 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AI Agent Security Risks: Why Autonomous Systems Are the Next Supply Chain Frontier]]></title>
      <description><![CDATA[AI agents are consuming APIs, installing packages, and executing code autonomously. The security implications are massive and largely unaddressed.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-agent-security-risks-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-agent-security-risks-2026</guid>
      <pubDate>Tue, 20 Jan 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[The npm 'everything' Package Attack (2024) Analyzed]]></title>
      <description><![CDATA[In January 2024 a developer published npm packages that depended on every public npm package, triggering a denial-of-service style incident across the registry.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-everything-package-attack-2024-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-everything-package-attack-2024-analysis</guid>
      <pubDate>Tue, 20 Jan 2026 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Pre-commit Hook Security Gotchas You'll Hit]]></title>
      <description><![CDATA[Pre-commit hooks feel like a free security win until you ship them at scale. Here are the failure modes, trust boundaries, and escape hatches that bite.]]></description>
      <link>https://safeguard.sh/resources/blog/pre-commit-hooks-security-gotchas</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pre-commit-hooks-security-gotchas</guid>
      <pubDate>Tue, 20 Jan 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[From DevOps to DevSecOps: A Practical Shift-Left Guide]]></title>
      <description><![CDATA[Shift-left security doesn't mean dumping security tools on developers. Here's a practical guide to integrating security into your development workflow without killing velocity.]]></description>
      <link>https://safeguard.sh/resources/blog/devops-devsecops-shift-left</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/devops-devsecops-shift-left</guid>
      <pubDate>Tue, 20 Jan 2026 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Safeguard Team)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Cohere Command for SecOps]]></title>
      <description><![CDATA[]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-cohere-command-for-secops</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-cohere-command-for-secops</guid>
      <pubDate>Mon, 19 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The Disproof Step: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Most AI bug hunters skip the hardest step: trying to kill their own findings. Here is why Griffin AI's disproof pass is the single biggest lever on false-positive rate.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-disproof-step</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-disproof-step</guid>
      <pubDate>Mon, 19 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Model Tiering Strategy: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Opus for reasoning, Sonnet for drafting, Haiku for scale. We break down when each tier earns its keep and why single-model architectures cannot compete.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-model-tiering-strategy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-model-tiering-strategy</guid>
      <pubDate>Mon, 19 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Distroless vs. Chainguard vs. Wolfi: Real Differences]]></title>
      <description><![CDATA[A working engineer's comparison of Google Distroless, Chainguard Images, and Wolfi as base images, covering what actually breaks in production and what does not.]]></description>
      <link>https://safeguard.sh/resources/blog/distroless-vs-chainguard-vs-wolfi-base-images</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/distroless-vs-chainguard-vs-wolfi-base-images</guid>
      <pubDate>Mon, 19 Jan 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Lottie Player npm Supply Chain Attack Explained]]></title>
      <description><![CDATA[A leaked maintainer token published three trojanized versions of @lottiefiles/lottie-player to npm, targeting wallet drains. Here is the mechanics.]]></description>
      <link>https://safeguard.sh/resources/blog/lottie-player-npm-supply-chain-attack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lottie-player-npm-supply-chain-attack</guid>
      <pubDate>Mon, 19 Jan 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Safety Eval Datasets as Supply Chain]]></title>
      <description><![CDATA[The datasets you use to evaluate model safety are themselves a supply chain, and almost nobody is treating them that way. A senior engineer's audit of how eval corpora get poisoned, contaminated, and silently drifted.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-safety-eval-datasets-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-safety-eval-datasets-supply-chain</guid>
      <pubDate>Sun, 18 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise AI Agent Deployment Lessons, 2026]]></title>
      <description><![CDATA[Lessons learned from a year of enterprise AI agent deployments: what worked, what failed, and what we would do differently starting now.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-ai-agent-deployment-lessons-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-ai-agent-deployment-lessons-2026</guid>
      <pubDate>Sun, 18 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Mistral Large for Remediation]]></title>
      <description><![CDATA[Mistral Large is a strong reasoning model, but remediation is more than generating a diff. We look at what Griffin AI adds for production fix workflows.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mistral-large-for-remediation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mistral-large-for-remediation</guid>
      <pubDate>Sun, 18 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SSO & SCIM: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Enterprise identity is not a paywall. It is the substrate on which every other security control depends, and it is where Mythos-class vendors quietly fall behind.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-enterprise-sso-scim</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-enterprise-sso-scim</guid>
      <pubDate>Sun, 18 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The MCP Threat Model: What Actually Matters in 2026]]></title>
      <description><![CDATA[Most MCP threat models confuse protocol risk with deployment risk. Here is what the real attack surface looks like after a year of production incidents.]]></description>
      <link>https://safeguard.sh/resources/blog/model-context-protocol-threat-model-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/model-context-protocol-threat-model-2026</guid>
      <pubDate>Sun, 18 Jan 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Inside Safeguard's Reachability Engine]]></title>
      <description><![CDATA[A deep look at how Safeguard's reachability engine combines call graph construction, symbolic analysis, and runtime evidence to reduce vulnerability noise by an order of magnitude.]]></description>
      <link>https://safeguard.sh/resources/blog/inside-safeguard-reachability-engine-architecture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/inside-safeguard-reachability-engine-architecture</guid>
      <pubDate>Sun, 18 Jan 2026 09:00:00 GMT</pubDate>
      <category>Architecture</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SWE-Bench With Security Extensions: Field Review]]></title>
      <description><![CDATA[SWE-bench became the default benchmark for measuring AI coding agents, but the security extensions that were bolted on afterwards deserve their own scrutiny. A field review of what they measure, where they break, and whether you should trust the numbers.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-benchmark-swe-bench-security-extensions</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-benchmark-swe-bench-security-extensions</guid>
      <pubDate>Sat, 17 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Claude Opus for Triage]]></title>
      <description><![CDATA[Griffin uses Claude Opus as its deepest reasoning engine. Here's what triage looks like with Opus alone versus Opus running inside Griffin's eval harness.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-claude-opus-for-triage</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-claude-opus-for-triage</guid>
      <pubDate>Sat, 17 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Auto-Fix Compile Rates: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Griffin AI's auto-fixes compile clean 73 percent of the time and pass with minor edits 87 percent. Mythos-class pure-LLM patches rarely show those numbers for a reason.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-auto-fix-compile-rates</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-auto-fix-compile-rates</guid>
      <pubDate>Sat, 17 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[WinRAR CVE-2025-0411 Mark-of-the-Web Bypass]]></title>
      <description><![CDATA[CVE-2025-0411 lets WinRAR archives bypass Windows Mark-of-the-Web when extracted. Here is the flaw, the observed campaigns, and the patching path.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2025-0411-winrar-mark-of-the-web-bypass</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2025-0411-winrar-mark-of-the-web-bypass</guid>
      <pubDate>Sat, 17 Jan 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Fine-Tuning Security LLMs vs Grounding: Which Wins]]></title>
      <description><![CDATA[Fine-tuning teaches a model to be a security expert. Grounding lets a general model act like one by reading the right sources. The right answer is usually both, but the proportions matter.]]></description>
      <link>https://safeguard.sh/resources/blog/fine-tuning-security-llm-vs-grounding-approach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fine-tuning-security-llm-vs-grounding-approach</guid>
      <pubDate>Fri, 16 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[EU CRA Readiness: Griffin AI vs Mythos]]></title>
      <description><![CDATA[The EU Cyber Resilience Act wants mandatory vulnerability handling, SBOM delivery, and documented due diligence. Griffin AI produces those artifacts continuously. Mythos-class tools produce conversations about them.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-eu-cra-readiness</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-eu-cra-readiness</guid>
      <pubDate>Fri, 16 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs OpenAI Codex for Security]]></title>
      <description><![CDATA[Codex-style coding agents are powerful for writing features. Security remediation needs a different shape of system—one that grounds frontier reasoning in SBOM, policy, and reachability context.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-openai-codex-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-openai-codex-security</guid>
      <pubDate>Fri, 16 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Secrets Management in CI Pipelines: 2026 Guide]]></title>
      <description><![CDATA[Rotating tokens, OIDC federation, and scoped runners are table stakes in 2026. Here is how senior engineers design CI secrets that do not leak on bad days.]]></description>
      <link>https://safeguard.sh/resources/blog/secrets-management-in-ci-pipelines-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/secrets-management-in-ci-pipelines-2026</guid>
      <pubDate>Fri, 16 Jan 2026 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Anthropic MCP Security Model: A Deep Dive]]></title>
      <description><![CDATA[Anthropic's Model Context Protocol introduces a new trust boundary between agents and tools. Here is how the security model actually works in practice.]]></description>
      <link>https://safeguard.sh/resources/blog/anthropic-mcp-security-model-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/anthropic-mcp-security-model-deep-dive</guid>
      <pubDate>Thu, 15 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Context Window As A Security Limit]]></title>
      <description><![CDATA[The context window is usually marketed as a capability parameter. In a security setting, it behaves like a budget, a forgetting function, and an attack surface all at once.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-context-window-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-context-window-security</guid>
      <pubDate>Thu, 15 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemini Ultra for Security Reasoning]]></title>
      <description><![CDATA[Gemini Ultra sets a high bar on complex reasoning benchmarks. But security reasoning is not benchmark reasoning. Here's how Griffin AI's engine-first approach changes the outcome.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-ultra-reasoning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-ultra-reasoning</guid>
      <pubDate>Thu, 15 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CycloneDX Support: Griffin AI vs Mythos]]></title>
      <description><![CDATA[CycloneDX is not a text format to be summarized — it's a typed graph with dozens of semantically-rich fields. Griffin AI consumes it as a graph. Mythos-class tools consume it as tokens. That difference decides every downstream finding.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cyclonedx-support</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-cyclonedx-support</guid>
      <pubDate>Thu, 15 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How a Fortune 500 Bank Ran Its SBOM Program]]></title>
      <description><![CDATA[An anonymized look at how a Fortune 500 financial services firm operationalized an enterprise SBOM program using Safeguard.sh across 4,200 applications.]]></description>
      <link>https://safeguard.sh/resources/blog/customer-story-fortune-500-bank-sbom-program-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/customer-story-fortune-500-bank-sbom-program-2026</guid>
      <pubDate>Thu, 15 Jan 2026 10:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[5 Software Supply Chain Security Trends Defining 2026]]></title>
      <description><![CDATA[From AI-generated code risks to regulatory enforcement, these are the supply chain security trends that will shape the year ahead.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-trends-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-trends-2026</guid>
      <pubDate>Thu, 15 Jan 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Training Data Provenance: The Regulatory Wave]]></title>
      <description><![CDATA[Regulators across three continents are converging on a single demand: show where your training data came from. The engineering implications are larger than most labs have admitted.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-training-data-provenance-regulation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-training-data-provenance-regulation</guid>
      <pubDate>Wed, 14 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Call Graph Depth Compared: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Shallow call graphs miss real exploits; deep graphs surface them. We examine how Griffin AI and Mythos-class tools differ on depth, and why it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-call-graph-depth</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-call-graph-depth</guid>
      <pubDate>Wed, 14 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[EO 14028 Two Years In: What Actually Shipped]]></title>
      <description><![CDATA[A clear-eyed look at what parts of Executive Order 14028 actually made it into production across federal agencies, vendors, and the SBOM ecosystem by 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/eo-14028-two-years-in-what-shipped</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eo-14028-two-years-in-what-shipped</guid>
      <pubDate>Wed, 14 Jan 2026 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[tj-actions/changed-files Compromise: What Happened]]></title>
      <description><![CDATA[A March 2025 GitHub Action compromise rewrote every tagged version to leak secrets. Here is the timeline, attack chain, and what repos need to change.]]></description>
      <link>https://safeguard.sh/resources/blog/tj-actions-changed-files-compromise-march-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/tj-actions-changed-files-compromise-march-2025</guid>
      <pubDate>Wed, 14 Jan 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Eval Methodology: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A benchmark number is only as good as the methodology that produced it. Here is how Griffin AI builds its harness and why most Mythos-class tools cannot be audited.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-eval-methodology</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-eval-methodology</guid>
      <pubDate>Tue, 13 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SQL Injection Chains: Griffin AI vs Mythos]]></title>
      <description><![CDATA[SQL injection stopped being a single-line bug years ago. Modern chains stitch a tainted parameter through ORMs, caches, background jobs, and downstream services. Griffin AI's engine-plus-LLM architecture follows the taint across those hops; Mythos-class pure-LLM scanners summarise one file at a time and lose the thread.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-sql-injection-chains</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-sql-injection-chains</guid>
      <pubDate>Tue, 13 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[K8s Admission Controllers for Supply Chain Policy]]></title>
      <description><![CDATA[How to design Kubernetes admission controllers that enforce supply chain policy without turning every deploy into a 30-minute argument with the cluster.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-admission-controller-supply-chain-policy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-admission-controller-supply-chain-policy</guid>
      <pubDate>Tue, 13 Jan 2026 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Apache OFBiz CVE-2024-38856 Pre-Auth RCE Analysis]]></title>
      <description><![CDATA[CVE-2024-38856 is an unauthenticated RCE in Apache OFBiz that bypasses authentication via screen rendering. Exploit chain, detection, and patching.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-38856-apache-ofbiz-pre-auth-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-38856-apache-ofbiz-pre-auth-rce</guid>
      <pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Hypothesis Quality: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Two AI bug hunters can both generate hypotheses. Only one can defend them. A field study of grounded versus ungrounded hypothesis generation in zero-day discovery.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-hypothesis-quality</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-hypothesis-quality</guid>
      <pubDate>Mon, 12 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Zero-Knowledge Proofs for Supply Chain Attestation]]></title>
      <description><![CDATA[Where zk-SNARKs, STARKs, and Bulletproofs actually fit in software supply chain attestation, and where conventional signatures remain the correct choice.]]></description>
      <link>https://safeguard.sh/resources/blog/zero-knowledge-proofs-supply-chain-attestation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zero-knowledge-proofs-supply-chain-attestation</guid>
      <pubDate>Mon, 12 Jan 2026 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Scanning for AI Models: A New Frontier]]></title>
      <description><![CDATA[AI models ship with dependencies, use vulnerable libraries, and introduce novel attack surfaces. Traditional scanning is not enough.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-model-vulnerability-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-model-vulnerability-scanning</guid>
      <pubDate>Mon, 12 Jan 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Q4 2025 Release Recap]]></title>
      <description><![CDATA[A full recap of Q4 2025 at Safeguard.sh: Griffin for Java and .NET, Eagle attestations, Lino serverless, Gold policy-aware remediation, and more.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-changelog-q4-2025-recap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-changelog-q4-2025-recap</guid>
      <pubDate>Mon, 12 Jan 2026 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Securing Claude Code MCP Server Deployments]]></title>
      <description><![CDATA[Claude Code MCP servers run with the privileges of the developer who invoked them. That makes deployment posture the entire security model.]]></description>
      <link>https://safeguard.sh/resources/blog/securing-claude-code-mcp-server-deployments</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/securing-claude-code-mcp-server-deployments</guid>
      <pubDate>Mon, 12 Jan 2026 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[XML Parsing Security: XXE, Billion Laughs, and Beyond]]></title>
      <description><![CDATA[XML's feature richness is its security weakness. XXE, entity expansion, and XSLT injection continue to plague applications that process XML.]]></description>
      <link>https://safeguard.sh/resources/blog/xml-parsing-security-xxe-billion-laughs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xml-parsing-security-xxe-billion-laughs</guid>
      <pubDate>Mon, 12 Jan 2026 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Explores Partnership With Tech-D Cybersecurity]]></title>
      <description><![CDATA[Safeguard.sh is in early-stage discussions with Tech-D Cybersecurity Ltd to explore co-selling, joint delivery, and shared services opportunities.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-exploring-partnership-tech-d-cybersecurity</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-exploring-partnership-tech-d-cybersecurity</guid>
      <pubDate>Mon, 12 Jan 2026 09:00:00 GMT</pubDate>
      <category>Company</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Air-Gapped Environments: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Air-gapped AI is not a feature flag. It is an architectural commitment, and it separates serious enterprise products from consumer-grade assistants.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-air-gapped-environments</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-air-gapped-environments</guid>
      <pubDate>Sun, 11 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Per-Scan Token Cost: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Tiered models and a deterministic engine cut token consumption to the moments that need reasoning. Pure-LLM tools pay full price for every trivial check.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-per-scan-token-cost</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-per-scan-token-cost</guid>
      <pubDate>Sun, 11 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs xAI Grok for Security]]></title>
      <description><![CDATA[]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-xai-grok-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-xai-grok-for-security</guid>
      <pubDate>Sun, 11 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise AI Security Rollout: The Governance Gap]]></title>
      <description><![CDATA[Most enterprises rolled out AI-for-security tools faster than their governance processes could keep up. The resulting gap is where most of the pain from 2025 deployments lives.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-ai-security-rollout-governance-gap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-ai-security-rollout-governance-gap</guid>
      <pubDate>Sat, 10 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Llama 3 for Security Workflows]]></title>
      <description><![CDATA[Llama 3 is a powerful open-weight foundation model, but security workflows demand more than raw inference. Here is how Griffin AI compares.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-llama-3-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-llama-3-for-security</guid>
      <pubDate>Sat, 10 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Remediation PR Quality: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Griffin AI produces draft PRs with taint paths, exploit hypotheses, and disproof attempts. Mythos-class pure-LLM tools skip those anchors, and PR quality suffers.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-remediation-pr-quality</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-remediation-pr-quality</guid>
      <pubDate>Sat, 10 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The State of SBOM Adoption in 2026: Progress, Gaps, and Reality]]></title>
      <description><![CDATA[SBOM adoption has grown rapidly, but maturity varies wildly. Here's where the industry actually stands heading into 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/state-of-sbom-adoption-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-of-sbom-adoption-2026</guid>
      <pubDate>Sat, 10 Jan 2026 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Griffin 3.0 GA: What's New]]></title>
      <description><![CDATA[Griffin 3.0 is now generally available. Here is what changed in the reasoning and remediation model, how it behaves in practice, and the defaults you should know.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-griffin-3-0-ga-release-announcement</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-griffin-3-0-ga-release-announcement</guid>
      <pubDate>Sat, 10 Jan 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CyberSecEval Reviewed: What It Measures]]></title>
      <description><![CDATA[A working engineer's review of CyberSecEval, the Meta-originated benchmark that has quietly become the default sniff test for AI-for-security claims. What it actually measures, what it misses, and how to read its scores without fooling yourself.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-benchmark-cybersecevval-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-benchmark-cybersecevval-review</guid>
      <pubDate>Fri, 09 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SSDF Attestation: Griffin AI vs Mythos]]></title>
      <description><![CDATA[The NIST SSDF attestation form asks structured questions with structured answers. A chat transcript is not an answer. We explain how Griffin AI produces the evidence auditors expect, and why Mythos-class tools struggle.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-ssdf-attestation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-ssdf-attestation</guid>
      <pubDate>Fri, 09 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Raw Claude for Security Workflow]]></title>
      <description><![CDATA[Griffin AI runs on Anthropic's Claude models under the hood. Here's what the engine context, eval harness, and workflow scaffolding actually buy you over calling Claude directly.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-raw-claude-security-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-raw-claude-security-workflow</guid>
      <pubDate>Fri, 09 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Windows MSHTML Spoofing CVE-2024-43573 Explained]]></title>
      <description><![CDATA[CVE-2024-43573 is a zero-day MSHTML spoofing flaw patched by Microsoft in October 2024. Here is the chain, detection, and why MSHTML keeps biting.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-43573-windows-mshtml-spoofing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-43573-windows-mshtml-spoofing</guid>
      <pubDate>Fri, 09 Jan 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Ultralytics PyPI Compromise: Dec 2024 Post-Mortem]]></title>
      <description><![CDATA[How a GitHub Actions cache poisoning attack pushed a crypto miner into Ultralytics 8.3.41 on PyPI, and what engineering teams should actually change.]]></description>
      <link>https://safeguard.sh/resources/blog/ultralytics-pypi-compromise-december-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ultralytics-pypi-compromise-december-2024</guid>
      <pubDate>Fri, 09 Jan 2026 00:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Agent Tool-Scope Enforcement Patterns]]></title>
      <description><![CDATA[Agents get tool lists, not tool boundaries. We walk through scoping patterns that actually hold when Claude 4 or GPT-5 picks the wrong function at runtime.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-agent-tool-scope-enforcement-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-agent-tool-scope-enforcement-patterns</guid>
      <pubDate>Thu, 08 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Pure GPT-5 for Security Workflows]]></title>
      <description><![CDATA[Frontier models are remarkable reasoners, but security workflows demand more than raw intelligence. Here's how Griffin AI grounds frontier reasoning in real tenant context.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-5-security-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gpt-5-security-workflow</guid>
      <pubDate>Thu, 08 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Reachability Analysis: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Reachability-grounded reasoning produces actionable findings. Ungrounded LLM reasoning produces speculation. We explain the methodology gap.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-reachability-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-reachability-analysis</guid>
      <pubDate>Thu, 08 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Specialised Security LLM vs Frontier Model: The Choice]]></title>
      <description><![CDATA[Frontier models are general polymaths. Security-specific LLMs are narrow experts. Choosing between them is rarely about raw intelligence and almost always about cost, latency, and the shape of your data.]]></description>
      <link>https://safeguard.sh/resources/blog/specialised-security-llm-vs-frontier-model-choice</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/specialised-security-llm-vs-frontier-model-choice</guid>
      <pubDate>Thu, 08 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Frontier Model Non-Determinism As A Security Limit]]></title>
      <description><![CDATA[Non-determinism is not a rough edge frontier labs will polish away. It is an architectural property of how transformer decoding works, and it places a hard ceiling on the kinds of security contracts you can sign.]]></description>
      <link>https://safeguard.sh/resources/blog/frontier-model-limit-non-determinism</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/frontier-model-limit-non-determinism</guid>
      <pubDate>Wed, 07 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI vs Gemini Pro for Security Workflow]]></title>
      <description><![CDATA[Gemini Pro brings capable reasoning and a massive context window to general-purpose workflows. Griffin AI brings a security engine with an LLM on top. The difference matters when the workflow is appsec.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-pro-security-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-gemini-pro-security-workflow</guid>
      <pubDate>Wed, 07 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Ingestion: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A detailed comparison of how Griffin AI consumes SBOMs as structured reasoning context while Mythos-class pure-LLM tools skim them as prose — and why that architectural gap determines the quality of every downstream finding.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-sbom-ingestion</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-sbom-ingestion</guid>
      <pubDate>Wed, 07 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Prompt Injection At Scale: 2026 Trend Review]]></title>
      <description><![CDATA[Prompt injection has evolved from demonstration exploits into a category of attack that runs continuously against production AI systems. Here is what changed in 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-security-trend-prompt-injection-at-scale-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-security-trend-prompt-injection-at-scale-2026</guid>
      <pubDate>Tue, 06 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Published Benchmarks: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Griffin AI publishes a five-family eval harness with concrete numbers. Most Mythos-class competitors ask buyers to trust marketing claims instead of data.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-published-benchmarks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-published-benchmarks</guid>
      <pubDate>Tue, 06 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Code-Generation Audit Trail Patterns]]></title>
      <description><![CDATA[When AI writes code that ships to production, the audit trail is a compliance requirement, not a nice-to-have. Patterns for capturing it without killing velocity.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-code-generation-audit-trail-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-code-generation-audit-trail-patterns</guid>
      <pubDate>Mon, 05 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Zero-Day Discovery Pipelines: Griffin AI vs Mythos]]></title>
      <description><![CDATA[A candid look at how Griffin AI's three-stage zero-day pipeline compares to pure-LLM Mythos-class bug hunters, and why false positive rates matter more than raw volume.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-zero-day-pipeline</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-zero-day-pipeline</guid>
      <pubDate>Mon, 05 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Q3 2025 Release Recap]]></title>
      <description><![CDATA[A quarterly recap of everything Safeguard.sh shipped in Q3 2025 across Griffin, Eagle, Lino, and Gold — with the improvements, deprecations, and next steps.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-changelog-q3-2025-recap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-changelog-q3-2025-recap</guid>
      <pubDate>Mon, 05 Jan 2026 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard v5: One Year In — What We Built, What We Learned]]></title>
      <description><![CDATA[A retrospective on Safeguard v5's first year in production, the features that resonated, and where we're headed next.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-v5-one-year-anniversary</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-v5-one-year-anniversary</guid>
      <pubDate>Mon, 05 Jan 2026 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Apache Struts CVE-2024-53677: The Path Traversal RCE]]></title>
      <description><![CDATA[CVE-2024-53677 lets attackers abuse Struts file upload parameter pollution to plant webshells. Here is the chain, detection logic, and patch guidance.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2024-53677-apache-struts-rce-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2024-53677-apache-struts-rce-deep-dive</guid>
      <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Risk Management: Beyond Vulnerability Scanning]]></title>
      <description><![CDATA[Vulnerability scanning catches known CVEs. But open source risk goes deeper — license compliance, maintainer health, dependency freshness, and supply chain attacks.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-risk-management</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-risk-management</guid>
      <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
      <category>Open Source</category>
      <author>hi@safeguard.sh (Safeguard Team)</author>
    </item>
    <item>
      <title><![CDATA[On-Prem Deployment: Griffin AI vs Mythos]]></title>
      <description><![CDATA[Why enterprise AI for security requires genuine on-premises deployment, not just a SaaS endpoint with a VPN in front of it.]]></description>
      <link>https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-on-premises-deployment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/griffin-ai-vs-mythos-on-premises-deployment</guid>
      <pubDate>Sun, 04 Jan 2026 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Homomorphic Encryption in Software Supply Chains]]></title>
      <description><![CDATA[A grounded look at BFV, CKKS, and TFHE schemes for supply chain workloads, measured costs, library choices, and where HE is not yet practical.]]></description>
      <link>https://safeguard.sh/resources/blog/homomorphic-encryption-software-supply-chain-use</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/homomorphic-encryption-software-supply-chain-use</guid>
      <pubDate>Mon, 22 Dec 2025 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[10 Predictions for Software Supply Chain Security in 2026]]></title>
      <description><![CDATA[From AI-generated SBOMs to regulatory enforcement and the death of CVSS-only triage, here is what the software security landscape will look like in 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/predictions-software-security-2026</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/predictions-software-security-2026</guid>
      <pubDate>Mon, 22 Dec 2025 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Compliance in 2025: Tracking Global Mandates and Deadlines]]></title>
      <description><![CDATA[SBOM requirements are now embedded in regulations across the US, EU, Japan, and beyond. A practical tracker of what is required, by whom, and by when.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-compliance-global-mandate-tracker</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-compliance-global-mandate-tracker</guid>
      <pubDate>Sat, 20 Dec 2025 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AI Tool Confused-Deputy: A Deep Dive]]></title>
      <description><![CDATA[The confused deputy problem takes on new and subtle forms when AI agents invoke tools on behalf of users. A technical deep dive with concrete mitigations.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-tool-confused-deputy-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-tool-confused-deputy-deep-dive</guid>
      <pubDate>Mon, 15 Dec 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The 2025 Software Supply Chain Security Report: Summary]]></title>
      <description><![CDATA[The 2025 annual SSCS report lands into a changed landscape. Key findings, trend lines, and what the numbers actually imply for 2026 planning.]]></description>
      <link>https://safeguard.sh/resources/blog/annual-sscs-report-summary-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/annual-sscs-report-summary-2025</guid>
      <pubDate>Mon, 15 Dec 2025 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security in 2025: The Year in Review]]></title>
      <description><![CDATA[From the CVE program funding crisis to the rise of AI-targeted supply chain attacks, 2025 reshaped the software security landscape. A comprehensive look at the year's defining events and trends.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-security-2025-year-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-security-2025-year-review</guid>
      <pubDate>Mon, 15 Dec 2025 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[The Secure Software Development Lifecycle in 2025: What Actually Changed]]></title>
      <description><![CDATA[A practical look at how SSDLC practices evolved in 2025, what worked, what failed, and why most organizations are still getting the basics wrong.]]></description>
      <link>https://safeguard.sh/resources/blog/secure-software-development-lifecycle-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/secure-software-development-lifecycle-2025</guid>
      <pubDate>Mon, 08 Dec 2025 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Prompt Injection Detection in Retrieval Systems]]></title>
      <description><![CDATA[Indirect prompt injection arrives through your retrieval corpus, not your chat box. We cover the detection strategies that survive when attackers write your RAG content.]]></description>
      <link>https://safeguard.sh/resources/blog/prompt-injection-detection-retrieval-systems</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/prompt-injection-detection-retrieval-systems</guid>
      <pubDate>Tue, 02 Dec 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The ROI of Vulnerability Remediation Automation: Numbers That Justify the Investment]]></title>
      <description><![CDATA[Manual vulnerability remediation costs more than most organizations realize. Breaking down the real costs, time savings, and risk reduction that automation delivers.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-remediation-automation-roi</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-remediation-automation-roi</guid>
      <pubDate>Mon, 01 Dec 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[A Practical Kubernetes Operator Security Checklist]]></title>
      <description><![CDATA[Kubernetes operators run with broad cluster access. This checklist covers the controls that matter most in 2025, from RBAC scoping to image provenance.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-operator-security-checklist</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-operator-security-checklist</guid>
      <pubDate>Fri, 28 Nov 2025 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Model Watermarking and Provenance]]></title>
      <description><![CDATA[Watermarking and provenance are the two most confused terms in AI security. A practical breakdown of what each actually does, where the 2025 techniques break, and what to ship in the meantime.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-model-watermarking-provenance-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-model-watermarking-provenance-techniques</guid>
      <pubDate>Tue, 25 Nov 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard CLI v5: Faster, Smarter, More Extensible]]></title>
      <description><![CDATA[Safeguard CLI v5 brings a rewritten scanning engine, plugin architecture, and native CI/CD integration. Here is what is new and how to upgrade.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-cli-v5-release</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-cli-v5-release</guid>
      <pubDate>Tue, 25 Nov 2025 09:00:00 GMT</pubDate>
      <category>Product Launch</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security for Regulated Industries]]></title>
      <description><![CDATA[Healthcare, finance, energy, and defense face unique supply chain security requirements. Here is how regulated industries should approach SBOM compliance and vulnerability management.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-for-regulated-industries</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-for-regulated-industries</guid>
      <pubDate>Thu, 20 Nov 2025 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Training Data Provenance for Enterprise Fine-Tuning]]></title>
      <description><![CDATA[Fine-tuning corpora are supply chain artifacts. We cover the provenance signals, attestations, and drift controls enterprises need before pushing weights to prod.]]></description>
      <link>https://safeguard.sh/resources/blog/training-data-provenance-enterprise-fine-tuning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/training-data-provenance-enterprise-fine-tuning</guid>
      <pubDate>Tue, 18 Nov 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[npm Provenance: Adoption Tracking in Late 2025]]></title>
      <description><![CDATA[Two and a half years after npm provenance launched, adoption is climbing but uneven. Here is the late-2025 picture across the top packages and frameworks.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-provenance-adoption-tracking-late-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-provenance-adoption-tracking-late-2025</guid>
      <pubDate>Wed, 12 Nov 2025 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AI-Generated SBOMs: How Accurate Are They?]]></title>
      <description><![CDATA[LLMs can now generate SBOMs from source code and documentation. We tested five AI SBOM generators against traditional tools to measure accuracy, completeness, and reliability.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-generated-sboms-accuracy-assessment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-generated-sboms-accuracy-assessment</guid>
      <pubDate>Wed, 12 Nov 2025 10:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Automating Open Source License Compliance: From Manual Audits to Continuous Enforcement]]></title>
      <description><![CDATA[Manual license audits cannot keep pace with modern dependency trees. Automated license detection, policy enforcement, and compliance documentation turn a legal bottleneck into a developer workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-license-compliance-automation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-license-compliance-automation</guid>
      <pubDate>Sat, 08 Nov 2025 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[WebAssembly WASI Security Model in 2025]]></title>
      <description><![CDATA[A technical look at WASI Preview 2, the component model, and capability-based isolation for running untrusted code inside supply chain tooling.]]></description>
      <link>https://safeguard.sh/resources/blog/webassembly-wasi-security-model-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/webassembly-wasi-security-model-2025</guid>
      <pubDate>Wed, 05 Nov 2025 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Software Provenance: An End-to-End Guide]]></title>
      <description><![CDATA[Provenance answers where software came from and how it was built. Here is how to implement end-to-end provenance tracking from source to deployment.]]></description>
      <link>https://safeguard.sh/resources/blog/software-provenance-end-to-end-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-provenance-end-to-end-guide</guid>
      <pubDate>Wed, 05 Nov 2025 10:00:00 GMT</pubDate>
      <category>Build Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Complete Guide to Dependency Lifecycle Management]]></title>
      <description><![CDATA[Dependencies are not static. They are born, maintained, deprecated, and abandoned. Here is how to manage the full lifecycle of your software dependencies.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-lifecycle-management-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-lifecycle-management-guide</guid>
      <pubDate>Thu, 30 Oct 2025 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[DHS Software Assurance Guidance: A Review]]></title>
      <description><![CDATA[CISA and DHS's October 2025 software assurance guidance refines federal expectations on SBOMs, attestation, and secure-by-design, and signals what is next.]]></description>
      <link>https://safeguard.sh/resources/blog/dhs-software-assurance-guidance-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dhs-software-assurance-guidance-2025</guid>
      <pubDate>Tue, 28 Oct 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Vulnerability Databases Compared: NVD, OSV, GitHub Advisory, and More]]></title>
      <description><![CDATA[Not all vulnerability databases are created equal. A detailed comparison of coverage, timeliness, accuracy, and practical usability across the major databases.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-vulnerability-database-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-vulnerability-database-comparison</guid>
      <pubDate>Wed, 22 Oct 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[RAG Poisoning: Defenses That Work]]></title>
      <description><![CDATA[Retrieval-augmented generation is the most common LLM deployment pattern in the enterprise and the most commonly poisoned. A senior security engineer's playbook for defences that hold up in production.]]></description>
      <link>https://safeguard.sh/resources/blog/retrieval-augmented-generation-poisoning-defenses</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/retrieval-augmented-generation-poisoning-defenses</guid>
      <pubDate>Mon, 20 Oct 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Embedding Model Supply Chain Risks]]></title>
      <description><![CDATA[Embedding models are the silent dependency under every RAG system. We cover poisoning, deprecation, and provenance gaps that break retrieval in production.]]></description>
      <link>https://safeguard.sh/resources/blog/embedding-model-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/embedding-model-supply-chain-risks</guid>
      <pubDate>Sat, 18 Oct 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[ISO 27001:2022 Transition Deadline: The Approach]]></title>
      <description><![CDATA[The October 31, 2025 ISO/IEC 27001:2022 transition deadline is weeks away. Here's what auditors will look for in Annex A controls, statements of applicability, and evidence packs.]]></description>
      <link>https://safeguard.sh/resources/blog/iso-27001-2022-transition-deadline-approach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/iso-27001-2022-transition-deadline-approach</guid>
      <pubDate>Wed, 15 Oct 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Introducing Safeguard Guardrails: Automated Policy Enforcement for Your Supply Chain]]></title>
      <description><![CDATA[Safeguard Guardrails brings automated, configurable policy enforcement to your software supply chain. Define rules once, enforce everywhere.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-guardrails-feature-release</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-guardrails-feature-release</guid>
      <pubDate>Wed, 15 Oct 2025 09:00:00 GMT</pubDate>
      <category>Product Launch</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[CVSS 4.0 Scoring Adoption: What Changed]]></title>
      <description><![CDATA[Two years after CVSS 4.0's release, adoption remains uneven. Here is where scoring really changed, where it did not, and how to handle mixed datasets.]]></description>
      <link>https://safeguard.sh/resources/blog/cvss-4-0-scoring-adoption-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cvss-4-0-scoring-adoption-review</guid>
      <pubDate>Fri, 10 Oct 2025 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CISA's Software Identification Ecosystem: What You Need to Know]]></title>
      <description><![CDATA[CISA is building a comprehensive software identification ecosystem that ties SBOMs, vulnerabilities, and procurement together. Here is what it means for software producers and consumers.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-software-identification-ecosystem</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-software-identification-ecosystem</guid>
      <pubDate>Fri, 10 Oct 2025 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Prisma Cloud vs Wiz: Supply Chain Features]]></title>
      <description><![CDATA[Both Prisma Cloud and Wiz have expanded into supply chain territory from cloud security origins. A head-to-head on what each actually delivers on the supply chain dimension.]]></description>
      <link>https://safeguard.sh/resources/blog/prisma-cloud-vs-wiz-supply-chain-features</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/prisma-cloud-vs-wiz-supply-chain-features</guid>
      <pubDate>Thu, 02 Oct 2025 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Container SBOM Generation: Best Practices for 2025]]></title>
      <description><![CDATA[Container images are multi-layered artifacts that challenge SBOM generators. Here is how to generate comprehensive, accurate SBOMs for containerized applications.]]></description>
      <link>https://safeguard.sh/resources/blog/container-sbom-generation-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-sbom-generation-best-practices</guid>
      <pubDate>Wed, 01 Oct 2025 10:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Attack Trends: Q3 2025]]></title>
      <description><![CDATA[A data-led look at software supply chain attacks in Q3 2025: npm maintainer phishing, VS Code extension abuse, and a quiet shift toward CI/CD targeting.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-attack-trends-q3-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-attack-trends-q3-2025</guid>
      <pubDate>Thu, 25 Sep 2025 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Attestation Frameworks Compared: SLSA, in-toto, and Sigstore]]></title>
      <description><![CDATA[Software attestation proves that your artifacts were built the way you claim. Here is a practical comparison of SLSA, in-toto, and Sigstore for securing your build pipeline.]]></description>
      <link>https://safeguard.sh/resources/blog/software-attestation-framework-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-attestation-framework-comparison</guid>
      <pubDate>Thu, 25 Sep 2025 10:00:00 GMT</pubDate>
      <category>Build Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[TLS Library Comparison: OpenSSL vs. LibreSSL vs. BoringSSL]]></title>
      <description><![CDATA[Three forks of the same codebase, three different security philosophies. Here is how to choose the right TLS library for your project.]]></description>
      <link>https://safeguard.sh/resources/blog/tls-library-comparison-openssl-libressl-boringssl</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/tls-library-comparison-openssl-libressl-boringssl</guid>
      <pubDate>Sat, 20 Sep 2025 10:00:00 GMT</pubDate>
      <category>Secure Development</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[VEX Adoption in the Enterprise: Lessons From Early Adopters]]></title>
      <description><![CDATA[Vulnerability Exploitability eXchange documents promise to reduce alert fatigue by distinguishing exploitable vulnerabilities from theoretical ones. Here is how enterprises are actually using them.]]></description>
      <link>https://safeguard.sh/resources/blog/vex-adoption-enterprise-case-studies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vex-adoption-enterprise-case-studies</guid>
      <pubDate>Thu, 18 Sep 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Agent Memory: Security Risks]]></title>
      <description><![CDATA[Persistent memory makes AI agents more useful and more dangerous. A security engineer's walkthrough of how agent memory gets poisoned, exfiltrated, and weaponised, with concrete 2025 examples.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-agent-memory-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-agent-memory-security-risks</guid>
      <pubDate>Mon, 15 Sep 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The HIPAA Security Rule Update and Your Supply Chain]]></title>
      <description><![CDATA[HHS's December 2024 NPRM rewrites the HIPAA Security Rule with explicit software supply chain, SBOM, and business associate controls set to take effect in 2025 and 2026.]]></description>
      <link>https://safeguard.sh/resources/blog/hipaa-security-rule-update-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/hipaa-security-rule-update-supply-chain</guid>
      <pubDate>Mon, 15 Sep 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Vector DB Security Considerations]]></title>
      <description><![CDATA[Vector stores hold derivatives of your most sensitive text. We cover the access, isolation, and integrity controls production deployments of Pinecone and Weaviate need.]]></description>
      <link>https://safeguard.sh/resources/blog/vector-db-security-considerations-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vector-db-security-considerations-2025</guid>
      <pubDate>Wed, 10 Sep 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Interoperability: Bridging CycloneDX and SPDX]]></title>
      <description><![CDATA[Your suppliers send SPDX. Your tools expect CycloneDX. Interoperability between SBOM formats is a real operational challenge. Here is how to solve it.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-interoperability-cyclonedx-spdx-bridge</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-interoperability-cyclonedx-spdx-bridge</guid>
      <pubDate>Wed, 10 Sep 2025 10:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[CNAPPs in 2025: What Cloud-Native Application Protection Platforms Actually Protect]]></title>
      <description><![CDATA[CNAPP has become the dominant category in cloud security. But the label covers wildly different capabilities. A clear-eyed look at what CNAPPs do, where they fall short, and how supply chain security fits in.]]></description>
      <link>https://safeguard.sh/resources/blog/cloud-native-application-protection-platforms</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloud-native-application-protection-platforms</guid>
      <pubDate>Fri, 05 Sep 2025 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[GenAI Code Review Tools: A 2025 Field Test]]></title>
      <description><![CDATA[We field-tested five GenAI code review tools against 240 seeded security defects to see which catch real issues and which hallucinate findings.]]></description>
      <link>https://safeguard.sh/resources/blog/genai-code-review-tools-field-test-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/genai-code-review-tools-field-test-2025</guid>
      <pubDate>Tue, 02 Sep 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Attacks Targeting AI/ML Pipelines]]></title>
      <description><![CDATA[AI and ML pipelines introduce unique supply chain risks -- from poisoned training data to compromised model registries. Here is what attackers are targeting and how to defend.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-attacks-targeting-ai-ml-pipelines</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-attacks-targeting-ai-ml-pipelines</guid>
      <pubDate>Mon, 01 Sep 2025 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Open-Weight Model Sandboxing Patterns]]></title>
      <description><![CDATA[Running an open-weight model inside an enterprise perimeter seems safer than calling a hosted API. It is, and it isn't. The sandboxing patterns that actually produce the safety properties.]]></description>
      <link>https://safeguard.sh/resources/blog/open-weight-model-sandboxing-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-weight-model-sandboxing-patterns</guid>
      <pubDate>Thu, 28 Aug 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Desktop App: Supply Chain Security Without the Browser Tab]]></title>
      <description><![CDATA[Announcing the Safeguard Desktop App -- a native application for macOS, Windows, and Linux that brings SBOM management, vulnerability tracking, and policy gates to your desktop.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-desktop-app-release</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-desktop-app-release</guid>
      <pubDate>Mon, 25 Aug 2025 09:00:00 GMT</pubDate>
      <category>Product Launch</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[How to Add Reachability Analysis to PR Checks]]></title>
      <description><![CDATA[Run reachability analysis on every pull request to slash vulnerability false positives by 70%+, gate merges on exploitable findings, and keep devs focused.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-add-reachability-analysis-to-pr-checks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-add-reachability-analysis-to-pr-checks</guid>
      <pubDate>Wed, 20 Aug 2025 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Runtime Threat Detection in Cloud-Native Environments]]></title>
      <description><![CDATA[Static analysis catches known vulnerabilities. Runtime detection catches exploitation. Here is how to implement runtime threat detection for containerized workloads.]]></description>
      <link>https://safeguard.sh/resources/blog/runtime-threat-detection-cloud-native</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/runtime-threat-detection-cloud-native</guid>
      <pubDate>Mon, 18 Aug 2025 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[EU NIS2 Directive: Enforcement at One Year]]></title>
      <description><![CDATA[Twelve months after the NIS2 transposition deadline, enforcement is uneven, fines are real, and software supply chain obligations are starting to bite.]]></description>
      <link>https://safeguard.sh/resources/blog/eu-nis2-directive-enforcement-first-year</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eu-nis2-directive-enforcement-first-year</guid>
      <pubDate>Fri, 15 Aug 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Local LLM Deployment: Enterprise Risks]]></title>
      <description><![CDATA[Running LLMs on local hardware eliminates some risks and introduces others. A clear-eyed look at the enterprise risk profile of on-premise and on-device model deployments.]]></description>
      <link>https://safeguard.sh/resources/blog/local-llm-deployment-enterprise-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/local-llm-deployment-enterprise-risks</guid>
      <pubDate>Tue, 12 Aug 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Maintainer Succession Planning: A Supply Chain Imperative]]></title>
      <description><![CDATA[When a solo maintainer disappears, entire dependency chains are at risk. How organizations should approach succession planning for critical open source projects.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-maintainer-succession-planning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-maintainer-succession-planning</guid>
      <pubDate>Sun, 10 Aug 2025 10:00:00 GMT</pubDate>
      <category>Open Source</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Binary SBOM Analysis: Creating Software Bills of Materials Without Source Code]]></title>
      <description><![CDATA[Not all software comes with source code. Binary analysis techniques can extract component information from compiled artifacts, firmware, and commercial software to produce SBOMs where traditional tools cannot.]]></description>
      <link>https://safeguard.sh/resources/blog/binary-sbom-analysis-reverse-engineering</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/binary-sbom-analysis-reverse-engineering</guid>
      <pubDate>Fri, 08 Aug 2025 10:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Security Budget Justification]]></title>
      <description><![CDATA[How to build a budget case for a supply chain security program that survives CFO scrutiny, with dollar-denominated risk, benchmarks, and staged investment tiers.]]></description>
      <link>https://safeguard.sh/resources/blog/security-budget-justification-supply-chain-program</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-budget-justification-supply-chain-program</guid>
      <pubDate>Tue, 05 Aug 2025 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Quality Metrics: Moving Beyond Completeness]]></title>
      <description><![CDATA[Most SBOM quality discussions stop at completeness. Real quality requires measuring accuracy, freshness, depth, and actionability. Here is a practical framework.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-quality-metrics-beyond-completeness</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-quality-metrics-beyond-completeness</guid>
      <pubDate>Fri, 01 Aug 2025 10:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Rust Memory Safety: A CVE Trend Analysis]]></title>
      <description><![CDATA[Analysis of CVE data across Rust crates and std releases, measuring how memory safety affects vulnerability shape, density, and unsafe-block concentration.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-memory-safety-cve-trend-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-memory-safety-cve-trend-analysis</guid>
      <pubDate>Wed, 30 Jul 2025 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Reachability Analysis in 2025: Separating Exploitable Vulnerabilities from Noise]]></title>
      <description><![CDATA[Reachability analysis determines whether a vulnerable function is actually called by your application. The technology has matured from research concept to production tool. Here is how it works and where it falls short.]]></description>
      <link>https://safeguard.sh/resources/blog/reachability-analysis-state-of-the-art-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/reachability-analysis-state-of-the-art-2025</guid>
      <pubDate>Mon, 28 Jul 2025 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Citrix Bleed 2: Analysis and Mitigation]]></title>
      <description><![CDATA[CVE-2025-5777 revived the memory-leak pattern that broke NetScaler in 2023. Here is what the 2025 variant does, who is exploiting it, and how to respond.]]></description>
      <link>https://safeguard.sh/resources/blog/citrix-bleed-2-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/citrix-bleed-2-analysis</guid>
      <pubDate>Fri, 25 Jul 2025 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Securing AI Agents: MCP Protocol Risks and Mitigations]]></title>
      <description><![CDATA[The Model Context Protocol is transforming how AI agents interact with tools, but it introduces new attack surfaces. Here is what security teams need to understand.]]></description>
      <link>https://safeguard.sh/resources/blog/securing-ai-agents-mcp-protocol-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/securing-ai-agents-mcp-protocol-risks</guid>
      <pubDate>Tue, 22 Jul 2025 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Artifactory vs Nexus for Enterprise in 2025]]></title>
      <description><![CDATA[JFrog Artifactory and Sonatype Nexus both remain viable enterprise artifact repositories in 2025. A head-to-head on scale, security, and the decision factors that actually matter.]]></description>
      <link>https://safeguard.sh/resources/blog/artifactory-vs-nexus-enterprise-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/artifactory-vs-nexus-enterprise-2025</guid>
      <pubDate>Wed, 16 Jul 2025 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The CVE Program Funding Crisis: What Happened and What It Means]]></title>
      <description><![CDATA[The CVE program nearly lost its funding in early 2025, exposing deep structural risks in how we track vulnerabilities. Here is what happened and where we go from here.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-program-funding-crisis-and-resolution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-program-funding-crisis-and-resolution</guid>
      <pubDate>Tue, 15 Jul 2025 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MGM Ransomware One Year Later: A Retrospective]]></title>
      <description><![CDATA[A 2025 retrospective on the September 2023 MGM Resorts ransomware incident, what changed, what stalled, and how supply chain defenders should adjust.]]></description>
      <link>https://safeguard.sh/resources/blog/mgm-ransomware-one-year-later-retrospective</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mgm-ransomware-one-year-later-retrospective</guid>
      <pubDate>Fri, 11 Jul 2025 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Attacks: H1 2025 Report]]></title>
      <description><![CDATA[A data-driven breakdown of supply chain attacks from January through June 2025, covering attack vectors, targeted ecosystems, and emerging trends.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-attacks-h1-2025-report</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-attacks-h1-2025-report</guid>
      <pubDate>Thu, 10 Jul 2025 10:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Compliance Reporting with Safeguard: From Raw Data to Audit-Ready Documents]]></title>
      <description><![CDATA[How to use Safeguard's compliance reporting engine to generate audit-ready documentation for SOC 2, ISO 27001, NIST SSDF, and other frameworks without weeks of manual work.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-compliance-reporting-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-compliance-reporting-guide</guid>
      <pubDate>Tue, 08 Jul 2025 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Introducing the Safeguard MCP Server: AI-Native Software Supply Chain Security]]></title>
      <description><![CDATA[Safeguard.sh launches its MCP Server, bringing software supply chain security directly into AI-powered development workflows through the Model Context Protocol.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-mcp-server-release</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-mcp-server-release</guid>
      <pubDate>Tue, 01 Jul 2025 09:00:00 GMT</pubDate>
      <category>Product Launch</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Japan AMED Software Supply Chain Guidance Overview]]></title>
      <description><![CDATA[Japan's AMED, METI, and PMDA guidance now converges on SBOMs and supply chain controls, reshaping how medical and industrial software is built, shipped, and maintained.]]></description>
      <link>https://safeguard.sh/resources/blog/japan-amed-software-supply-chain-guidance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/japan-amed-software-supply-chain-guidance</guid>
      <pubDate>Wed, 25 Jun 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Building an Open Source Risk Intelligence Platform: Beyond Vulnerability Scanning]]></title>
      <description><![CDATA[Vulnerability scanning is one dimension of open source risk. A true risk intelligence platform must also evaluate maintainer health, project sustainability, licensing, and malicious package threats.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-risk-intelligence-platform</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-risk-intelligence-platform</guid>
      <pubDate>Wed, 25 Jun 2025 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes 1.33 Security Deep Dive]]></title>
      <description><![CDATA[Kubernetes 1.33 shipped with meaningful security changes: stronger admission controls, expanded structured authorization, and several deprecations that will affect production clusters.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-1-33-security-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-1-33-security-deep-dive</guid>
      <pubDate>Fri, 20 Jun 2025 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Griffin AI: Autonomous Vulnerability Remediation That Actually Works]]></title>
      <description><![CDATA[Griffin AI moves beyond scan-and-alert to autonomously generate, test, and propose vulnerability fixes. How Safeguard's remediation engine reduces mean time to fix without introducing new risk.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-griffin-ai-autonomous-remediation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-griffin-ai-autonomous-remediation</guid>
      <pubDate>Sun, 15 Jun 2025 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Runbooks for Dependency Disclosure Events]]></title>
      <description><![CDATA[Detailed runbooks for responding to dependency CVE disclosures across languages and ecosystems, with roles, commands, and timelines tuned for automation.]]></description>
      <link>https://safeguard.sh/resources/blog/runbooks-for-dependency-disclosure-events</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/runbooks-for-dependency-disclosure-events</guid>
      <pubDate>Fri, 13 Jun 2025 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AI SBOMs and Model Cards: Building Transparency Into the AI Supply Chain]]></title>
      <description><![CDATA[As AI models become critical software components, the need for AI-specific SBOMs and model cards grows urgent. How the industry is extending supply chain transparency to machine learning pipelines.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-sbom-model-cards-transparency-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-sbom-model-cards-transparency-2025</guid>
      <pubDate>Tue, 10 Jun 2025 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[How Safeguard Auto-Fix Actually Works Under the Hood]]></title>
      <description><![CDATA[A technical breakdown of Safeguard's automated vulnerability remediation engine, from dependency resolution to pull request generation and compatibility verification.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-auto-fix-how-it-works</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-auto-fix-how-it-works</guid>
      <pubDate>Thu, 05 Jun 2025 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[OWASP ASVS 5.0 Adoption Guide]]></title>
      <description><![CDATA[OWASP ASVS 5.0 restructured the verification levels and added new requirements for modern stacks. A practical adoption guide for teams using ASVS as their security baseline.]]></description>
      <link>https://safeguard.sh/resources/blog/owasp-asvs-5-0-adoption-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/owasp-asvs-5-0-adoption-guide</guid>
      <pubDate>Tue, 03 Jun 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security Maturity: Where Does Your Organization Stand?]]></title>
      <description><![CDATA[Most organizations know they should care about software supply chain security, but few have a structured way to assess their maturity. A practical framework for evaluating and improving your posture.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-maturity-assessment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-maturity-assessment</guid>
      <pubDate>Sun, 01 Jun 2025 10:00:00 GMT</pubDate>
      <category>Frameworks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Service Mesh for Supply Chain Policy Enforcement]]></title>
      <description><![CDATA[Using Istio, Linkerd, and Cilium service mesh to enforce signed-artifact, SPIFFE identity, and provenance-aware policy in production clusters.]]></description>
      <link>https://safeguard.sh/resources/blog/service-mesh-supply-chain-policy-enforcement</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/service-mesh-supply-chain-policy-enforcement</guid>
      <pubDate>Sat, 24 May 2025 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard IDE Extension v5: Security Feedback Where Developers Actually Work]]></title>
      <description><![CDATA[The Safeguard IDE Extension v5 brings SBOM generation, vulnerability alerts, and policy checks directly into VS Code and JetBrains IDEs. A deep dive into what changed and why it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-ide-extension-v5-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-ide-extension-v5-deep-dive</guid>
      <pubDate>Tue, 20 May 2025 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise Rails Security Audit: 2025 Field Notes]]></title>
      <description><![CDATA[After 14 Rails audits in the last 12 months, the same eight issues kept surfacing. Here's the 2025 field checklist for Rails 7.2 and 8.0 enterprise apps.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-ruby-on-rails-security-audit-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-ruby-on-rails-security-audit-2025</guid>
      <pubDate>Fri, 16 May 2025 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Coinbase Social Engineering and Insider Threat: How Bribed Support Agents Led to a $400M Breach]]></title>
      <description><![CDATA[Attackers bribed overseas Coinbase support agents to steal customer data, then demanded a $20M ransom. Coinbase refused to pay and disclosed everything.]]></description>
      <link>https://safeguard.sh/resources/blog/coinbase-social-engineering-insider-threat</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/coinbase-social-engineering-insider-threat</guid>
      <pubDate>Thu, 15 May 2025 10:00:00 GMT</pubDate>
      <category>Breach Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Prioritization in 2025: EPSS, VEX, and the End of CVSS-Only Triage]]></title>
      <description><![CDATA[CVSS scores alone cannot tell you what to patch first. EPSS exploit prediction and VEX documents are reshaping how mature security teams prioritize vulnerabilities at scale.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-prioritization-epss-vex-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-prioritization-epss-vex-2025</guid>
      <pubDate>Thu, 15 May 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Dior Customer Data Breach 2025: Luxury Fashion's Cybersecurity Problem]]></title>
      <description><![CDATA[Christian Dior disclosed a breach exposing customer personal data in May 2025. The luxury sector's data protection challenges are now front and center.]]></description>
      <link>https://safeguard.sh/resources/blog/dior-customer-data-breach-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dior-customer-data-breach-2025</guid>
      <pubDate>Mon, 12 May 2025 10:00:00 GMT</pubDate>
      <category>Breach Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Choosing a Private Package Registry in 2025]]></title>
      <description><![CDATA[A 2025 buyer's guide comparing JFrog Artifactory, Sonatype Nexus, GitHub Packages, Google Artifact Registry, and Cloudsmith on ecosystems, policy, and TCO.]]></description>
      <link>https://safeguard.sh/resources/blog/choosing-a-private-package-registry-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/choosing-a-private-package-registry-2025</guid>
      <pubDate>Thu, 08 May 2025 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise Software Supply Chain Management with Safeguard ESSCM]]></title>
      <description><![CDATA[A practical guide to implementing Safeguard's Enterprise Software Supply Chain Management framework across large organizations with complex dependency ecosystems.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-esscm-enterprise-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-esscm-enterprise-guide</guid>
      <pubDate>Thu, 08 May 2025 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Container Hardening Guide 2025: From Base Image to Production]]></title>
      <description><![CDATA[A practical guide to hardening container images and deployments. Covers base image selection, build-time security, runtime protections, and Kubernetes-specific controls.]]></description>
      <link>https://safeguard.sh/resources/blog/container-hardening-guide-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-hardening-guide-2025</guid>
      <pubDate>Mon, 05 May 2025 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Harrods Cyber Attack: The UK Retail Sector Under Sustained Assault]]></title>
      <description><![CDATA[Harrods became the third major UK retailer hit by cyber attacks in weeks, following M&S and Co-op. The pattern points to coordinated campaigns targeting retail.]]></description>
      <link>https://safeguard.sh/resources/blog/harrods-cyber-attack-retail-sector</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/harrods-cyber-attack-retail-sector</guid>
      <pubDate>Thu, 01 May 2025 10:00:00 GMT</pubDate>
      <category>Breach Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Commvault CVE-2025-34028: SSRF to RCE in Enterprise Backup Software]]></title>
      <description><![CDATA[A critical SSRF vulnerability in Commvault Command Center allowed unauthenticated attackers to achieve remote code execution on backup infrastructure. CISA added it to the KEV catalog.]]></description>
      <link>https://safeguard.sh/resources/blog/commvault-cve-2025-34028-ssrf-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/commvault-cve-2025-34028-ssrf-rce</guid>
      <pubDate>Thu, 01 May 2025 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[AWS Service-Linked Role Abuse Techniques, 2025]]></title>
      <description><![CDATA[Service-linked roles are the soft underbelly of AWS IAM. We catalogue the 2024-2025 abuse primitives and the detection queries that catch them.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-service-linked-role-abuse-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-service-linked-role-abuse-techniques</guid>
      <pubDate>Mon, 28 Apr 2025 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Audio Processing Library Vulnerabilities: The Sound of Exploitation]]></title>
      <description><![CDATA[Audio libraries parse complex binary formats in C code. They share the same vulnerability patterns as image and video codecs, with less security scrutiny.]]></description>
      <link>https://safeguard.sh/resources/blog/audio-processing-library-vulnerabilities</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/audio-processing-library-vulnerabilities</guid>
      <pubDate>Mon, 28 Apr 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Research</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Nova Scotia Power Cyber Incident: When Critical Infrastructure Gets Hit]]></title>
      <description><![CDATA[Nova Scotia Power disclosed a cyber incident in April 2025 that compromised customer data. The attack highlights the persistent vulnerability of utility companies.]]></description>
      <link>https://safeguard.sh/resources/blog/nova-scotia-power-cyber-incident</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nova-scotia-power-cyber-incident</guid>
      <pubDate>Mon, 28 Apr 2025 10:00:00 GMT</pubDate>
      <category>Breach Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SAP NetWeaver CVE-2025-31324: Unrestricted File Upload Zero-Day]]></title>
      <description><![CDATA[A critical file upload vulnerability in SAP NetWeaver Visual Composer was exploited to deploy web shells on enterprise SAP systems. The flaw required no authentication and scored 10.0 on CVSS.]]></description>
      <link>https://safeguard.sh/resources/blog/sap-netweaver-cve-2025-31324-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sap-netweaver-cve-2025-31324-zero-day</guid>
      <pubDate>Thu, 24 Apr 2025 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Marks & Spencer DragonForce Ransomware Attack: Retail Giant Brought to Its Knees]]></title>
      <description><![CDATA[The April 2025 ransomware attack on M&S disrupted online orders for weeks, wiped out hundreds of millions in market value, and exposed retail sector vulnerabilities.]]></description>
      <link>https://safeguard.sh/resources/blog/marks-spencer-dragonforce-ransomware</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/marks-spencer-dragonforce-ransomware</guid>
      <pubDate>Tue, 22 Apr 2025 10:00:00 GMT</pubDate>
      <category>Breach Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[DevSecOps Tools Comparison 2025: Choosing the Right Stack]]></title>
      <description><![CDATA[The DevSecOps tooling landscape has exploded. From SAST to SCA to SBOM management, this guide compares the major categories and helps you build a coherent security toolchain.]]></description>
      <link>https://safeguard.sh/resources/blog/devsecops-tools-comparison-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/devsecops-tools-comparison-2025</guid>
      <pubDate>Sun, 20 Apr 2025 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Portal Deep Dive: Navigating the Security Dashboard]]></title>
      <description><![CDATA[A comprehensive walkthrough of the Safeguard.sh portal, covering every panel, metric, and workflow that security teams use daily to manage software supply chain risk.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-portal-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-portal-deep-dive</guid>
      <pubDate>Sun, 20 Apr 2025 09:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Erlang/OTP SSH CVE-2025-32433: Unauthenticated RCE Scoring 10.0]]></title>
      <description><![CDATA[A maximum-severity vulnerability in Erlang/OTP's SSH server allowed unauthenticated remote code execution. Any system running Erlang's built-in SSH daemon was at risk, including telecom infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/erlang-otp-ssh-cve-2025-32433-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/erlang-otp-ssh-cve-2025-32433-rce</guid>
      <pubDate>Wed, 16 Apr 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Rust Supply Chain: cargo-vet Expansion in 2025]]></title>
      <description><![CDATA[Mozilla and Google expanded cargo-vet's shared audit pool to 14,000 crates in Q1 2025. Here's how to adopt it without drowning in imports.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-supply-chain-cargo-vet-expansion-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-supply-chain-cargo-vet-expansion-2025</guid>
      <pubDate>Tue, 15 Apr 2025 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Windows NTLM Hash Disclosure CVE-2025-24054: The Protocol That Won't Die]]></title>
      <description><![CDATA[CVE-2025-24054 leaks NTLM hashes through .library-ms files with minimal user interaction. Microsoft patched it in April 2025, but exploitation started almost immediately.]]></description>
      <link>https://safeguard.sh/resources/blog/windows-ntlm-hash-disclosure-cve-2025-24054</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/windows-ntlm-hash-disclosure-cve-2025-24054</guid>
      <pubDate>Tue, 15 Apr 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[How to Test Your Signing Pipeline End to End]]></title>
      <description><![CDATA[Build a repeatable end-to-end test harness for your signing pipeline that proves artifacts are signed correctly and that verification fails when tampered.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-test-your-signing-pipeline-end-to-end</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-test-your-signing-pipeline-end-to-end</guid>
      <pubDate>Thu, 10 Apr 2025 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Transparency Goes Global: Regulatory Developments in 2025]]></title>
      <description><![CDATA[From the EU Cyber Resilience Act to Japan's software security guidelines, governments worldwide are mandating software transparency. A comprehensive overview of the global regulatory landscape.]]></description>
      <link>https://safeguard.sh/resources/blog/software-transparency-global-regulations-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-transparency-global-regulations-2025</guid>
      <pubDate>Thu, 10 Apr 2025 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Bounty Program Scoping for Dependencies]]></title>
      <description><![CDATA[How to scope a bug bounty program when most of your attack surface lives in third-party dependencies — with guidance on payouts, triage, and upstream coordination.]]></description>
      <link>https://safeguard.sh/resources/blog/bounty-program-scoping-for-dependencies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bounty-program-scoping-for-dependencies</guid>
      <pubDate>Tue, 08 Apr 2025 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CrushFTP CVE-2025-31161: Authentication Bypass Exploited in the Wild]]></title>
      <description><![CDATA[A critical authentication bypass in CrushFTP allowed unauthenticated access to file transfer servers. Exploitation was observed within days of disclosure, targeting multiple industries.]]></description>
      <link>https://safeguard.sh/resources/blog/crushftp-cve-2025-31161-authentication-bypass</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/crushftp-cve-2025-31161-authentication-bypass</guid>
      <pubDate>Mon, 07 Apr 2025 08:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[MCP Server Authentication and Authorization: Securing the AI Tool Layer]]></title>
      <description><![CDATA[The Model Context Protocol enables AI agents to interact with external tools and data sources. Securing MCP servers requires authentication, authorization, and input validation patterns specific to the AI agent context.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-server-authentication-authorization</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-server-authentication-authorization</guid>
      <pubDate>Sat, 05 Apr 2025 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Ivanti Connect Secure CVE-2025-22457: Another Critical Zero-Day, Same Product]]></title>
      <description><![CDATA[A stack-based buffer overflow in Ivanti Connect Secure was exploited by Chinese threat actors just months after the previous zero-day in the same product. The vulnerability was initially misclassified as low-risk.]]></description>
      <link>https://safeguard.sh/resources/blog/ivanti-connect-secure-cve-2025-22457</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ivanti-connect-secure-cve-2025-22457</guid>
      <pubDate>Thu, 03 Apr 2025 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[npm Supply Chain Attacks Q1 2025: Dependency Confusion, Typosquatting, and Maintainer Takeovers]]></title>
      <description><![CDATA[The first quarter of 2025 saw a sharp increase in npm supply chain attacks. We catalog the major incidents and analyze the evolving techniques.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-attacks-npm-2025-q1</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-attacks-npm-2025-q1</guid>
      <pubDate>Tue, 01 Apr 2025 10:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Security Metrics for Executive Reporting]]></title>
      <description><![CDATA[A field-tested board-level metrics framework for supply chain security, covering MTTR, reachable risk, SBOM coverage, and vendor posture with dollar-tied targets.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-metrics-executive-reporting</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-metrics-executive-reporting</guid>
      <pubDate>Fri, 28 Mar 2025 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Malicious Packages 2025: Python's Growing Supply Chain Problem]]></title>
      <description><![CDATA[PyPI faced a surge of malicious package uploads in early 2025, targeting data science, AI/ML, and cloud development workflows. Here's the full picture.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-malicious-packages-2025-report</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-malicious-packages-2025-report</guid>
      <pubDate>Fri, 28 Mar 2025 10:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Oracle Critical Control Baseline: Regulatory Impact]]></title>
      <description><![CDATA[Oracle's February 2025 Critical Control Baseline for critical infrastructure customers reshapes SCRM obligations. Here's what legal and security teams must know.]]></description>
      <link>https://safeguard.sh/resources/blog/oracle-ccb-regulatory-impact-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/oracle-ccb-regulatory-impact-analysis</guid>
      <pubDate>Tue, 25 Mar 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Chrome Zero-Day CVE-2025-2783: Sandbox Escape Used in Espionage Campaign]]></title>
      <description><![CDATA[Kaspersky discovered a Chrome zero-day being exploited in a targeted espionage campaign dubbed Operation ForumTroll. The flaw broke Chrome's sandbox with no user interaction beyond clicking a link.]]></description>
      <link>https://safeguard.sh/resources/blog/chrome-zero-day-cve-2025-2783-kaspersky</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chrome-zero-day-cve-2025-2783-kaspersky</guid>
      <pubDate>Tue, 25 Mar 2025 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Next.js Middleware Authorization Bypass: CVE-2025-29927]]></title>
      <description><![CDATA[A critical flaw in Next.js allowed attackers to bypass middleware-based authorization by setting a single HTTP header. Applications relying on middleware for auth checks were completely exposed.]]></description>
      <link>https://safeguard.sh/resources/blog/next-js-middleware-cve-2025-29927</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/next-js-middleware-cve-2025-29927</guid>
      <pubDate>Fri, 21 Mar 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Scattered Spider 2025: How the Most Dangerous Social Engineering Group Evolved]]></title>
      <description><![CDATA[Scattered Spider adapted its tactics in 2025, moving beyond casino hacks to target retail, healthcare, and manufacturing with increasingly sophisticated social engineering.]]></description>
      <link>https://safeguard.sh/resources/blog/scattered-spider-2025-evolution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/scattered-spider-2025-evolution</guid>
      <pubDate>Thu, 20 Mar 2025 10:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Confidential Computing in Supply Chain Integration]]></title>
      <description><![CDATA[How Intel TDX, AMD SEV-SNP, and AWS Nitro enclaves plug into build and signing pipelines, with attestation flows and operational tradeoffs.]]></description>
      <link>https://safeguard.sh/resources/blog/confidential-computing-supply-chain-integration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/confidential-computing-supply-chain-integration</guid>
      <pubDate>Tue, 18 Mar 2025 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CISA KEV Catalog in 2025: What the Data Tells Us About Real-World Exploitation]]></title>
      <description><![CDATA[The CISA Known Exploited Vulnerabilities catalog has become the definitive list of actively exploited flaws. An analysis of 2025 KEV trends reveals which products, vulnerability types, and attack patterns dominate.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-known-exploited-vulnerabilities-2025-update</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-known-exploited-vulnerabilities-2025-update</guid>
      <pubDate>Tue, 18 Mar 2025 10:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Actions Supply Chain Attack: The tj-actions/changed-files Compromise]]></title>
      <description><![CDATA[Attackers compromised the popular tj-actions/changed-files GitHub Action, injecting credential-stealing code that affected over 23,000 repositories. A textbook software supply chain attack.]]></description>
      <link>https://safeguard.sh/resources/blog/github-actions-supply-chain-attack-tj-actions</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-actions-supply-chain-attack-tj-actions</guid>
      <pubDate>Sat, 15 Mar 2025 08:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[FedRAMP Continuous Monitoring Automation Playbook]]></title>
      <description><![CDATA[FedRAMP 20x demands real-time ConMon. Here's how to automate monthly POA&M, vulnerability deviation, and SBOM attestation without a 20-person team.]]></description>
      <link>https://safeguard.sh/resources/blog/fedramp-continuous-monitoring-automation-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fedramp-continuous-monitoring-automation-2025</guid>
      <pubDate>Wed, 12 Mar 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Apple WebKit Zero-Day CVE-2025-24201: Out-of-Bounds Write Exploited in the Wild]]></title>
      <description><![CDATA[Apple patched CVE-2025-24201, a WebKit zero-day that allowed sandbox escape through malicious web content. Here's the technical breakdown.]]></description>
      <link>https://safeguard.sh/resources/blog/apple-webkit-zero-day-cve-2025-24201</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apple-webkit-zero-day-cve-2025-24201</guid>
      <pubDate>Wed, 12 Mar 2025 10:00:00 GMT</pubDate>
      <category>Zero-Day Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Attestation Requirements: A Roadmap Read]]></title>
      <description><![CDATA[PEP 740 brings Sigstore-style attestations to PyPI. A close read of the roadmap, what's actually shipped, and what it means for consumers and publishers over the next 12 months.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-attestation-requirements-roadmap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-attestation-requirements-roadmap</guid>
      <pubDate>Mon, 10 Mar 2025 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI Agent Tool Calling Security: Risks and Mitigations]]></title>
      <description><![CDATA[AI agents that call tools -- APIs, databases, file systems, code interpreters -- convert non-deterministic LLM output into real-world actions. Securing this boundary is the defining challenge of agentic AI.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-agent-tool-calling-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-agent-tool-calling-security</guid>
      <pubDate>Mon, 10 Mar 2025 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Security Census 2025: Who Maintains the Code We All Depend On?]]></title>
      <description><![CDATA[An analysis of the state of open-source security in 2025. Critical infrastructure runs on projects maintained by small, often unpaid teams. Here is what the data shows and why it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-security-census-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-security-census-2025</guid>
      <pubDate>Sat, 08 Mar 2025 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Video Codec Supply Chain Risks: The Hidden Attack Surface in Media Libraries]]></title>
      <description><![CDATA[Video codecs are some of the most complex code in your dependency tree. Their complexity and privileged execution make them prime supply chain targets.]]></description>
      <link>https://safeguard.sh/resources/blog/video-codec-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/video-codec-supply-chain-risks</guid>
      <pubDate>Wed, 05 Mar 2025 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[AI Agent Frameworks: A Security Assessment of the New Autonomous Frontier]]></title>
      <description><![CDATA[AI agents that can execute code, browse the web, and manage infrastructure are proliferating. The security implications of these autonomous frameworks demand scrutiny.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-agent-frameworks-security-assessment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-agent-frameworks-security-assessment</guid>
      <pubDate>Wed, 05 Mar 2025 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[How to Monitor Go Module Substitution Attacks]]></title>
      <description><![CDATA[Defend against Go module substitution attacks with GOPROXY, GOSUMDB, vendor verification, and checksum database monitoring — complete with working examples.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-monitor-go-module-substitution-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-monitor-go-module-substitution-attacks</guid>
      <pubDate>Tue, 04 Mar 2025 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Broadcom VMware Zero-Days March 2025: ESXi, Workstation, and Fusion Under Active Attack]]></title>
      <description><![CDATA[Three VMware zero-days exploited in the wild in March 2025 let attackers escape virtual machine sandboxes. Broadcom patched, but the damage window was wide open.]]></description>
      <link>https://safeguard.sh/resources/blog/broadcom-vmware-zero-days-march-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/broadcom-vmware-zero-days-march-2025</guid>
      <pubDate>Tue, 04 Mar 2025 10:00:00 GMT</pubDate>
      <category>Zero-Day Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Paragon Partition Manager BYOVD: CVE-2025-0289 Kernel-Level Exploitation]]></title>
      <description><![CDATA[Five vulnerabilities in Paragon Partition Manager's kernel driver were exploited in BYOVD attacks, allowing attackers to gain SYSTEM privileges on Windows systems. Microsoft added the driver to its blocklist.]]></description>
      <link>https://safeguard.sh/resources/blog/paragon-partition-manager-cve-2025-0289</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/paragon-partition-manager-cve-2025-0289</guid>
      <pubDate>Sat, 01 Mar 2025 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[LLM-Augmented Bug Discovery Methodology]]></title>
      <description><![CDATA[A practitioner's methodology for using LLMs to augment — not replace — traditional bug discovery workflows, with patterns that hold up under real review load.]]></description>
      <link>https://safeguard.sh/resources/blog/llm-augmented-bug-discovery-methodology</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/llm-augmented-bug-discovery-methodology</guid>
      <pubDate>Tue, 25 Feb 2025 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security: An Executive Guide for 2025]]></title>
      <description><![CDATA[Software supply chain attacks have surged 742% since 2019. This guide cuts through the noise to explain what executives need to know, what questions to ask, and where to invest.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-executive-guide-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-executive-guide-2025</guid>
      <pubDate>Tue, 25 Feb 2025 09:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[GitLab CI/CD Security Hardening for 2025]]></title>
      <description><![CDATA[A practical hardening playbook for GitLab 17.8 covering runner isolation, OIDC federation, CI variable scoping, and protected branch enforcement.]]></description>
      <link>https://safeguard.sh/resources/blog/gitlab-cicd-security-hardening-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gitlab-cicd-security-hardening-2025</guid>
      <pubDate>Thu, 20 Feb 2025 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Juniper Router CVE-2025-21589: Authentication Bypass That Puts Network Perimeters at Risk]]></title>
      <description><![CDATA[A critical authentication bypass in Juniper's Session Smart Router lets remote attackers hijack admin sessions. Here's what happened, why it matters, and what to do.]]></description>
      <link>https://safeguard.sh/resources/blog/juniper-router-cve-2025-21589-auth-bypass</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/juniper-router-cve-2025-21589-auth-bypass</guid>
      <pubDate>Thu, 20 Feb 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[MCP Protocol Security: What the Model Context Protocol Means for Supply Chains]]></title>
      <description><![CDATA[Anthropic's Model Context Protocol standardizes how AI models interact with external tools. The security implications for software supply chains are significant.]]></description>
      <link>https://safeguard.sh/resources/blog/mcp-protocol-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mcp-protocol-security-implications</guid>
      <pubDate>Thu, 20 Feb 2025 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Qilin Ransomware Group: Dissecting a Rising Threat Actor]]></title>
      <description><![CDATA[Qilin has rapidly become one of the most active ransomware operations, targeting healthcare, manufacturing, and critical infrastructure. A technical breakdown of their methods.]]></description>
      <link>https://safeguard.sh/resources/blog/qilin-ransomware-group-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/qilin-ransomware-group-analysis</guid>
      <pubDate>Thu, 20 Feb 2025 00:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Microsoft Power Pages CVE-2025-24989: Privilege Escalation in Low-Code Platforms]]></title>
      <description><![CDATA[Microsoft patched an actively exploited privilege escalation vulnerability in Power Pages, its low-code web platform. The flaw allowed unauthorized users to gain elevated access within affected sites.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-power-pages-cve-2025-24989</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-power-pages-cve-2025-24989</guid>
      <pubDate>Wed, 19 Feb 2025 11:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Canadian Cyber Centre Supply Chain Guidance]]></title>
      <description><![CDATA[The CCCS's 2024-2025 supply chain guidance and Bill C-26 reshape Canada's expectations for SBOMs, vendor assurance, and protection of critical cyber systems.]]></description>
      <link>https://safeguard.sh/resources/blog/canadian-cyber-center-supply-chain-guidance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/canadian-cyber-center-supply-chain-guidance</guid>
      <pubDate>Tue, 18 Feb 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Python Cython Extensions and the Supply Chain]]></title>
      <description><![CDATA[Cython-built Python extensions ship as platform-specific binaries with a build toolchain behind them. That introduces supply chain surface most teams have not mapped.]]></description>
      <link>https://safeguard.sh/resources/blog/python-cython-extensions-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-cython-extensions-supply-chain</guid>
      <pubDate>Fri, 14 Feb 2025 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Palo Alto PAN-OS Authentication Bypass: CVE-2025-0108]]></title>
      <description><![CDATA[A path traversal flaw in Palo Alto Networks PAN-OS management web interface allowed unauthenticated access to sensitive REST API endpoints. Exploitation began within days of disclosure.]]></description>
      <link>https://safeguard.sh/resources/blog/palo-alto-pan-os-cve-2025-0108-auth-bypass</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/palo-alto-pan-os-cve-2025-0108-auth-bypass</guid>
      <pubDate>Wed, 12 Feb 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[AI Deepfake Phishing Campaigns in 2025: When Seeing and Hearing Isn't Believing]]></title>
      <description><![CDATA[AI-generated voice and video deepfakes powered a new wave of phishing campaigns in early 2025. The technology is cheap, the results are convincing, and defenses are lagging.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-deepfake-phishing-campaigns-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-deepfake-phishing-campaigns-2025</guid>
      <pubDate>Mon, 10 Feb 2025 10:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[AI Code Assistants and Security: The Hidden Risks in 2025]]></title>
      <description><![CDATA[AI coding assistants are generating millions of lines of production code. But they also introduce dependency hallucinations, insecure patterns, and supply chain risks that security teams need to address.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-code-assistants-security-implications-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-code-assistants-security-implications-2025</guid>
      <pubDate>Sat, 08 Feb 2025 10:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[2025 Bug Bounty Program Reforms: What Changed]]></title>
      <description><![CDATA[From Microsoft's AI bounty expansion to the EU CRA's good-faith researcher protections, bug bounty rules of engagement shifted meaningfully in early 2025.]]></description>
      <link>https://safeguard.sh/resources/blog/cve-2025-bug-bounty-program-reform</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cve-2025-bug-bounty-program-reform</guid>
      <pubDate>Tue, 04 Feb 2025 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Zyxel Router Command Injection: CVE-2024-40891 Exploited in the Wild]]></title>
      <description><![CDATA[Threat actors began mass-exploiting a Telnet-based command injection flaw in Zyxel CPE routers, with over 1,500 devices compromised in botnet campaigns. Zyxel initially refused to patch.]]></description>
      <link>https://safeguard.sh/resources/blog/zyxel-router-cve-2024-40891-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zyxel-router-cve-2024-40891-exploitation</guid>
      <pubDate>Tue, 04 Feb 2025 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[How to Run Grype in Offline/Airgap Environments]]></title>
      <description><![CDATA[A hands-on tutorial for running Grype vulnerability scans in offline and airgapped environments, including vulnerability database hosting and CI integration.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-run-grype-in-offline-airgap-environments</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-run-grype-in-offline-airgap-environments</guid>
      <pubDate>Tue, 28 Jan 2025 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SonicWall SMA 1000 Zero-Day: CVE-2025-23006 Pre-Auth RCE]]></title>
      <description><![CDATA[SonicWall disclosed CVE-2025-23006, a critical deserialization vulnerability in its SMA 1000 series gateways that was actively exploited as a zero-day before patches were available.]]></description>
      <link>https://safeguard.sh/resources/blog/sonicwall-sma-cve-2025-23006-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sonicwall-sma-cve-2025-23006-zero-day</guid>
      <pubDate>Wed, 22 Jan 2025 08:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Exploit Chaining: A Supply Chain Perspective]]></title>
      <description><![CDATA[How attackers chain low and medium severity flaws across dependencies to reach critical impact, and why supply chain context changes triage priorities.]]></description>
      <link>https://safeguard.sh/resources/blog/exploit-chaining-supply-chain-perspective</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/exploit-chaining-supply-chain-perspective</guid>
      <pubDate>Mon, 20 Jan 2025 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Organization Accounts: The Security Model]]></title>
      <description><![CDATA[PyPI Organization Accounts add real structure to a registry that was individual-first for two decades. A deep look at the security model, what it enables, and what it still doesn't.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-organization-accounts-security-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-organization-accounts-security-model</guid>
      <pubDate>Mon, 20 Jan 2025 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Prompt Injection as a Supply Chain Risk: When AI Dependencies Are Exploitable]]></title>
      <description><![CDATA[Prompt injection is not just an application vulnerability. When LLMs process content from the software supply chain -- package descriptions, README files, commit messages -- injection becomes a supply chain attack vector.]]></description>
      <link>https://safeguard.sh/resources/blog/prompt-injection-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/prompt-injection-supply-chain-risks</guid>
      <pubDate>Mon, 20 Jan 2025 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Citrix NetScaler CVE-2025 Vulnerabilities: Another Year, Another Gateway Crisis]]></title>
      <description><![CDATA[Citrix NetScaler started 2025 with multiple critical CVEs affecting ADC and Gateway products. We break down the technical details and the recurring pattern.]]></description>
      <link>https://safeguard.sh/resources/blog/citrix-netscaler-cve-2025-vulnerabilities</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/citrix-netscaler-cve-2025-vulnerabilities</guid>
      <pubDate>Sat, 18 Jan 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The SBOM Compliance Landscape in 2025: What You Need to Know]]></title>
      <description><![CDATA[From the US Executive Order to the EU Cyber Resilience Act, SBOM requirements are becoming law. Here is where things stand in 2025 and what organizations need to do to comply.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-compliance-landscape-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-compliance-landscape-2025</guid>
      <pubDate>Sat, 18 Jan 2025 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[DORA Operational Resilience: Software Implications]]></title>
      <description><![CDATA[DORA became fully applicable January 17, 2025. Here's what Articles 6, 8, 28, and the ICT third-party RTS mean for the software you build, buy, and operate in the EU.]]></description>
      <link>https://safeguard.sh/resources/blog/dora-operational-resilience-software-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dora-operational-resilience-software-implications</guid>
      <pubDate>Fri, 17 Jan 2025 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Medusa Ransomware: How Supply Chain Tactics Fuel a Growing Threat]]></title>
      <description><![CDATA[Medusa ransomware has evolved beyond traditional encryption schemes, leveraging supply chain compromise to infiltrate victims. Here's what defenders need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/medusa-ransomware-supply-chain-tactics</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/medusa-ransomware-supply-chain-tactics</guid>
      <pubDate>Wed, 15 Jan 2025 00:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Salt Typhoon Telco Intrusion: What We Know]]></title>
      <description><![CDATA[Salt Typhoon breached at least nine U.S. carriers, exposing lawful intercept systems. We unpack the attack chain and what telcos must fix in 2025.]]></description>
      <link>https://safeguard.sh/resources/blog/salt-typhoon-telco-intrusion-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/salt-typhoon-telco-intrusion-analysis</guid>
      <pubDate>Tue, 14 Jan 2025 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Fog Ransomware: Why the Education Sector Keeps Getting Hit]]></title>
      <description><![CDATA[Fog ransomware has carved a niche targeting schools and universities, exploiting chronic underfunding and SonicWall VPN vulnerabilities to devastating effect.]]></description>
      <link>https://safeguard.sh/resources/blog/fog-ransomware-education-sector-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fog-ransomware-education-sector-attacks</guid>
      <pubDate>Tue, 14 Jan 2025 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Fortinet FortiGate Authentication Bypass: CVE-2024-55591 Explained]]></title>
      <description><![CDATA[A critical authentication bypass in FortiOS and FortiProxy allowed attackers to gain super-admin privileges via crafted Node.js websocket requests. Here's what happened and how to protect your infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/fortinet-fortigate-auth-bypass-cve-2024-55591</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fortinet-fortigate-auth-bypass-cve-2024-55591</guid>
      <pubDate>Tue, 14 Jan 2025 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Ivanti Connect Secure Zero-Day: CVE-2025-0282 Under Active Exploitation]]></title>
      <description><![CDATA[A stack-based buffer overflow in Ivanti Connect Secure allowed unauthenticated remote code execution. Chinese threat actors exploited it before any patch existed.]]></description>
      <link>https://safeguard.sh/resources/blog/ivanti-connect-secure-cve-2025-0282-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ivanti-connect-secure-cve-2025-0282-zero-day</guid>
      <pubDate>Wed, 08 Jan 2025 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard 5.0: The Next Generation of Software Supply Chain Security]]></title>
      <description><![CDATA[Safeguard 5.0 introduces Griffin AI, expanded SBOM analysis, and a redesigned policy engine. Here is what is new and why it matters for your security program.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-v5-release-announcement</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-v5-release-announcement</guid>
      <pubDate>Sun, 05 Jan 2025 08:00:00 GMT</pubDate>
      <category>Product Update</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Space Industry Software Supply Chain: Emerging Reality]]></title>
      <description><![CDATA[COTS software, mega-constellations, and export controls are colliding. The space sector's software supply chain risk is shifting faster than its tooling.]]></description>
      <link>https://safeguard.sh/resources/blog/space-industry-software-supply-chain-emerging</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/space-industry-software-supply-chain-emerging</guid>
      <pubDate>Sat, 28 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Zoom Incidents: Software Supply Chain Dimensions]]></title>
      <description><![CDATA[Zoom's security history from 2020 onward reshaped how the industry thinks about conferencing software supply chains, from installers to third-party components.]]></description>
      <link>https://safeguard.sh/resources/blog/zoom-incidents-software-supply-chain-dimensions</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zoom-incidents-software-supply-chain-dimensions</guid>
      <pubDate>Sat, 28 Dec 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[End-of-Year Security Planning: Setting Up Next Year for Success]]></title>
      <description><![CDATA[The end of the year is when security programs are made or broken. Here is how to conduct an effective annual security review and build a plan that will actually be executed.]]></description>
      <link>https://safeguard.sh/resources/blog/end-of-year-security-planning-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/end-of-year-security-planning-guide</guid>
      <pubDate>Sat, 28 Dec 2024 09:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Data Pipeline Platform Migration Security]]></title>
      <description><![CDATA[Moving from one orchestration platform to another surfaces hidden trust relationships. A security-first migration plan for Airflow, Dagster, and Prefect transitions.]]></description>
      <link>https://safeguard.sh/resources/blog/data-pipeline-platform-migration-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/data-pipeline-platform-migration-security</guid>
      <pubDate>Sun, 22 Dec 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Digital Health HIPAA Supply Chain Intersection]]></title>
      <description><![CDATA[Digital health startups collide with HIPAA obligations as soon as they touch clinical data. A regulatory map of the supply chain choke points.]]></description>
      <link>https://safeguard.sh/resources/blog/digital-health-hipaa-supply-chain-intersection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/digital-health-hipaa-supply-chain-intersection</guid>
      <pubDate>Sun, 22 Dec 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Fulcio Certificate Lifecycle: Enterprise View]]></title>
      <description><![CDATA[Fulcio issues short-lived certificates for keyless signing. Here is the enterprise view of how those certificates are issued, validated, and woven into long-term trust.]]></description>
      <link>https://safeguard.sh/resources/blog/fulcio-certificate-lifecycle-enterprise</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fulcio-certificate-lifecycle-enterprise</guid>
      <pubDate>Sun, 22 Dec 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security in 2024: A Year in Review]]></title>
      <description><![CDATA[From the CrowdStrike outage to state-sponsored npm campaigns and regulatory milestones, 2024 was the year supply chain security went from niche concern to operational necessity.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-security-2024-year-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-security-2024-year-review</guid>
      <pubDate>Sun, 22 Dec 2024 10:00:00 GMT</pubDate>
      <category>Industry Trends</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[eBPF Security Controls: A Production Experience Report]]></title>
      <description><![CDATA[Field notes on running Tetragon, Falco, and Cilium eBPF controls in production Kubernetes clusters, with observed overhead, policy traps, and kernel constraints.]]></description>
      <link>https://safeguard.sh/resources/blog/ebpf-security-controls-production-experience</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ebpf-security-controls-production-experience</guid>
      <pubDate>Fri, 20 Dec 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Post-Incident Vendor Coordination]]></title>
      <description><![CDATA[When a vendor's incident affects you, the coordination work between their IR team and your ops becomes its own project. How to run it well.]]></description>
      <link>https://safeguard.sh/resources/blog/post-incident-vendor-coordination</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/post-incident-vendor-coordination</guid>
      <pubDate>Fri, 20 Dec 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Reproducible Builds Debian: The Long View]]></title>
      <description><![CDATA[Debian's Reproducible Builds project has been at it for over a decade. Here's what they've learned, what still isn't reproducible, and why it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/reproducible-builds-debian-long-view</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/reproducible-builds-debian-long-view</guid>
      <pubDate>Fri, 20 Dec 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security Predictions for 2025]]></title>
      <description><![CDATA[From AI-generated code risks to regulatory enforcement and package manager security evolution, here are the trends that will define software supply chain security in 2025.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-predictions-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-predictions-2025</guid>
      <pubDate>Fri, 20 Dec 2024 10:00:00 GMT</pubDate>
      <category>Industry Trends</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[The 2024 End-of-Year Vulnerability Disclosure Report]]></title>
      <description><![CDATA[A look back at vulnerability disclosure in 2024: counts, severity distribution, time-to-patch, and the handful of incidents that shifted practice. Numbers, not narrative.]]></description>
      <link>https://safeguard.sh/resources/blog/end-of-year-vulnerability-disclosure-report-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/end-of-year-vulnerability-disclosure-report-2024</guid>
      <pubDate>Wed, 18 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[MITRE ATT&CK Meets SSDF: A Mapping]]></title>
      <description><![CDATA[ATT&CK describes how adversaries operate; SSDF describes how to build software that resists them. Here's how to map adversary techniques to secure-development tasks so your threat model drives real engineering change.]]></description>
      <link>https://safeguard.sh/resources/blog/mitre-attack-meets-ssdf-mapping</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mitre-attack-meets-ssdf-mapping</guid>
      <pubDate>Wed, 18 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[OpenTelemetry for Supply Chain Traces: Instrumenting the Pipeline]]></title>
      <description><![CDATA[How OpenTelemetry turns CI/CD pipelines into a traceable, queryable graph that exposes supply chain risk from source control to production deployment.]]></description>
      <link>https://safeguard.sh/resources/blog/opentelemetry-for-supply-chain-traces</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/opentelemetry-for-supply-chain-traces</guid>
      <pubDate>Wed, 18 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[RubyGems Reserved Namespace Claims]]></title>
      <description><![CDATA[A look at how organizations can claim reserved namespace prefixes on RubyGems.org, what the policy currently supports, and where it falls short for real enterprise use cases.]]></description>
      <link>https://safeguard.sh/resources/blog/rubygems-reserved-namespace-claims</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rubygems-reserved-namespace-claims</guid>
      <pubDate>Wed, 18 Dec 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Rust Embedded Supply Chain Guide]]></title>
      <description><![CDATA[Rust is moving into embedded production fast. The supply chain shape for firmware is different from server-side Rust — smaller trees, longer lifetimes, tighter regulations.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-embedded-supply-chain-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-embedded-supply-chain-guide</guid>
      <pubDate>Wed, 18 Dec 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Azure Sentinel for Supply Chain Detection]]></title>
      <description><![CDATA[Sentinel has everything it needs to detect supply chain attacks in Azure — but only if the analytics rules are tuned to what those attacks actually look like.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-sentinel-supply-chain-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-sentinel-supply-chain-detection</guid>
      <pubDate>Sun, 15 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[BlackTech Firmware Supply Chain Operations]]></title>
      <description><![CDATA[BlackTech's firmware implants in Cisco routers turned edge devices into long-dwell footholds. A look at the tradecraft and what defenders missed.]]></description>
      <link>https://safeguard.sh/resources/blog/blacktech-firmware-supply-chain-operations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/blacktech-firmware-supply-chain-operations</guid>
      <pubDate>Sun, 15 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Download Statistics as a Security Signal]]></title>
      <description><![CDATA[PyPI download numbers are noisy, gameable, and widely misused. A closer look at what they actually measure, how to read them for security purposes, and where they break.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-download-statistics-as-security-signal</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-download-statistics-as-security-signal</guid>
      <pubDate>Sun, 15 Dec 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Exploitation Trends in 2024: What the Data Shows]]></title>
      <description><![CDATA[Analysis of 2024 vulnerability exploitation patterns reveals faster weaponization timelines, shifting target profiles, and the growing importance of edge device vulnerabilities.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-exploitation-trends-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-exploitation-trends-2024</guid>
      <pubDate>Sun, 15 Dec 2024 12:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Coordinated Disclosure Zero-Day Playbook]]></title>
      <description><![CDATA[A playbook for coordinated disclosure of zero-day vulnerabilities, covering timelines, stakeholder management, embargo discipline, and the judgement calls in between.]]></description>
      <link>https://safeguard.sh/resources/blog/coordinated-disclosure-zero-day-playbook</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/coordinated-disclosure-zero-day-playbook</guid>
      <pubDate>Thu, 12 Dec 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[OSS Code of Conduct: Security Impact]]></title>
      <description><![CDATA[Codes of conduct are not just social documents. They affect maintainer retention, contributor diversity, and ultimately the security posture of the project.]]></description>
      <link>https://safeguard.sh/resources/blog/oss-community-code-of-conduct-security-impact</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/oss-community-code-of-conduct-security-impact</guid>
      <pubDate>Thu, 12 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Dev Machine Secrets: The Exfiltration Risks]]></title>
      <description><![CDATA[Engineer laptops are the softest target in most organizations. Here is a senior engineer's look at the real exfiltration paths for developer secrets and how to shut them down.]]></description>
      <link>https://safeguard.sh/resources/blog/dev-machine-secrets-exfiltration-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dev-machine-secrets-exfiltration-risks</guid>
      <pubDate>Tue, 10 Dec 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Security Funding in 2024: Who Pays for the Code We All Depend On]]></title>
      <description><![CDATA[Despite growing recognition that open source underpins critical infrastructure, security funding remains fragmented and insufficient. A look at the numbers and what needs to change.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-security-funding-report-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-security-funding-report-2024</guid>
      <pubDate>Tue, 10 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Turborepo Monorepo Supply Chain Security]]></title>
      <description><![CDATA[Turborepo makes large JavaScript monorepos fast, and speed changes how teams think about dependencies. The supply chain implications are subtle enough that a fast-moving team can be in trouble before anyone notices.]]></description>
      <link>https://safeguard.sh/resources/blog/turborepo-monorepo-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/turborepo-monorepo-supply-chain-security</guid>
      <pubDate>Tue, 10 Dec 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GCP Security Command Center Integration]]></title>
      <description><![CDATA[An industry-level look at integrating GCP Security Command Center with the rest of the security stack: which findings are signal, which are noise, and how to route the output so it actually gets actioned.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-security-command-center-integration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-security-command-center-integration</guid>
      <pubDate>Sun, 08 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[DevSecOps Automation Maturity in 2024: Where Teams Actually Stand]]></title>
      <description><![CDATA[Industry surveys and real-world data paint a sobering picture of DevSecOps automation maturity. Most organizations are still in the early stages despite years of investment.]]></description>
      <link>https://safeguard.sh/resources/blog/devsecops-automation-maturity-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/devsecops-automation-maturity-2024</guid>
      <pubDate>Thu, 05 Dec 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Hardening GitLab vs GitHub Default Settings]]></title>
      <description><![CDATA[GitLab and GitHub both ship with defaults that prioritize usability. A head-to-head on the specific hardening steps each platform needs before it is safe for enterprise use.]]></description>
      <link>https://safeguard.sh/resources/blog/hardening-gitlab-vs-github-default-settings</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/hardening-gitlab-vs-github-default-settings</guid>
      <pubDate>Thu, 05 Dec 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Java SBOM Generation Tools Compared]]></title>
      <description><![CDATA[Six tools generate SBOMs from Java projects. They disagree on transitive depth, license fields, and licensing of their own output. A head-to-head.]]></description>
      <link>https://safeguard.sh/resources/blog/java-supply-chain-sbom-generation-tools</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/java-supply-chain-sbom-generation-tools</guid>
      <pubDate>Thu, 05 Dec 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Woodpecker CI Security Review]]></title>
      <description><![CDATA[A security review of Woodpecker CI, the community fork of Drone: runner isolation, secret handling, plugin ecosystem, and the trade-offs of running a self-hosted lightweight CI.]]></description>
      <link>https://safeguard.sh/resources/blog/woodpecker-ci-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/woodpecker-ci-security-review</guid>
      <pubDate>Mon, 02 Dec 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Container Security Best Practices for 2025: Beyond Image Scanning]]></title>
      <description><![CDATA[Container security has evolved far past vulnerability scanning. Here is what mature container security programs look like heading into 2025.]]></description>
      <link>https://safeguard.sh/resources/blog/container-security-best-practices-2025</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-security-best-practices-2025</guid>
      <pubDate>Sun, 01 Dec 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Crypto Exchange Supply Chain Hardening]]></title>
      <description><![CDATA[Crypto exchanges are the highest-value software supply chain targets on the internet. A hardening playbook drawn from Lazarus, Ronin, and 3CX.]]></description>
      <link>https://safeguard.sh/resources/blog/crypto-exchange-supply-chain-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/crypto-exchange-supply-chain-hardening</guid>
      <pubDate>Thu, 28 Nov 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Go Build Cache Poisoning Risks]]></title>
      <description><![CDATA[The Go build cache makes builds fast and reproducible, but a poisoned cache can reuse malicious compiled output indefinitely while the source looks clean.]]></description>
      <link>https://safeguard.sh/resources/blog/go-build-cache-poisoning-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-build-cache-poisoning-risks</guid>
      <pubDate>Thu, 28 Nov 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[An npm Incident Response Playbook]]></title>
      <description><![CDATA[When an npm package in your dependency graph is compromised at midnight, you need a playbook, not a brainstorm. Here is the one I wrote after three real incidents.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-incident-response-playbook</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-incident-response-playbook</guid>
      <pubDate>Thu, 28 Nov 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Mailchimp 2022-2023 Incidents: A Timeline]]></title>
      <description><![CDATA[Mailchimp disclosed three social-engineering-driven intrusions in thirteen months; the timeline illustrates how repeated incidents shape vendor trust.]]></description>
      <link>https://safeguard.sh/resources/blog/mailchimp-2022-2023-incidents-timeline</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mailchimp-2022-2023-incidents-timeline</guid>
      <pubDate>Mon, 25 Nov 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NYDFS 500 Meets SBOM Requirements]]></title>
      <description><![CDATA[23 NYCRR Part 500 was amended in 2023 with stronger third-party and vulnerability management language. For covered financial entities, SBOM practice has quietly become a compliance expectation.]]></description>
      <link>https://safeguard.sh/resources/blog/nydfs-500-meets-sbom-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nydfs-500-meets-sbom-requirements</guid>
      <pubDate>Mon, 25 Nov 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Zero Trust Principles Applied to the Software Supply Chain]]></title>
      <description><![CDATA[Zero trust is not just a network architecture concept. Applied to the software supply chain, it fundamentally changes how organizations verify code, dependencies, and build processes.]]></description>
      <link>https://safeguard.sh/resources/blog/zero-trust-software-supply-chain-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zero-trust-software-supply-chain-2024</guid>
      <pubDate>Mon, 25 Nov 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Azure Monitor for Supply Chain Observability]]></title>
      <description><![CDATA[Supply chain observability in Azure is not missing telemetry — it is missing the right queries. A walk through the Azure Monitor data sources that actually answer the hard questions.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-monitor-supply-chain-observability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-monitor-supply-chain-observability</guid>
      <pubDate>Fri, 22 Nov 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[NIST CSF 2.0 Rollout: Field Observations]]></title>
      <description><![CDATA[NIST CSF 2.0 added the Govern function, broadened the target audience, and clarified supply chain expectations. Field observations from the first year of adoption.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-csf-2-0-rollout-observations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-csf-2-0-rollout-observations</guid>
      <pubDate>Fri, 22 Nov 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NuGet Signed Packages Verification]]></title>
      <description><![CDATA[NuGet supports signed packages — author signatures, repository signatures, and verification modes. A practical guide to enforcing it properly.]]></description>
      <link>https://safeguard.sh/resources/blog/nuget-signed-packages-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nuget-signed-packages-verification</guid>
      <pubDate>Fri, 22 Nov 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Secrets Rotation Across Microservices: A Playbook]]></title>
      <description><![CDATA[A practical senior engineer's playbook for rotating secrets across microservices without downtime, drift, or the quiet credential leaks that come from half-done cutovers.]]></description>
      <link>https://safeguard.sh/resources/blog/secrets-rotation-across-microservices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/secrets-rotation-across-microservices</guid>
      <pubDate>Fri, 22 Nov 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[FIN7: Financial-Sector Supply Chain Tradecraft]]></title>
      <description><![CDATA[FIN7 has spent a decade evolving from POS malware to supply chain operations. A look at the current tradecraft and the implications for financial-sector defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/fin7-financial-sector-supply-chain-tradecraft</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fin7-financial-sector-supply-chain-tradecraft</guid>
      <pubDate>Wed, 20 Nov 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Provenance Attestation Consumer Workflow]]></title>
      <description><![CDATA[Generating provenance is half the story. Consuming it correctly, at the right points in the pipeline, is where the security value actually materialises.]]></description>
      <link>https://safeguard.sh/resources/blog/provenance-attestation-consumer-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/provenance-attestation-consumer-workflow</guid>
      <pubDate>Wed, 20 Nov 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Software Composition Analysis Market in 2024: Consolidation and Evolution]]></title>
      <description><![CDATA[The SCA market is maturing fast, with acquisitions, AI-powered analysis, and SBOM mandates reshaping the competitive landscape and what buyers should expect.]]></description>
      <link>https://safeguard.sh/resources/blog/software-composition-analysis-market-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-composition-analysis-market-2024</guid>
      <pubDate>Wed, 20 Nov 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Automotive ISO/SAE 21434: Supply Chain Implications]]></title>
      <description><![CDATA[ISO/SAE 21434 makes cybersecurity a type-approval requirement. Here is how the standard reshapes OEM and tier-N software supply chain obligations.]]></description>
      <link>https://safeguard.sh/resources/blog/automotive-iso-21434-supply-chain-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/automotive-iso-21434-supply-chain-implications</guid>
      <pubDate>Mon, 18 Nov 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Dataflow Analysis in Modern Codebases]]></title>
      <description><![CDATA[Dataflow analysis is the workhorse behind most vulnerability research. Here's how it adapts to TypeScript, Rust, and the polyglot realities of modern software.]]></description>
      <link>https://safeguard.sh/resources/blog/dataflow-analysis-modern-codebases</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dataflow-analysis-modern-codebases</guid>
      <pubDate>Mon, 18 Nov 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GCP Terraform Provider Security Review]]></title>
      <description><![CDATA[A security-focused review of the Google Terraform providers: provenance, authentication paths, state handling, and the misconfigurations that consistently produce incidents across the Google and Google-Beta provider ecosystem.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-terraform-provider-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-terraform-provider-security-review</guid>
      <pubDate>Mon, 18 Nov 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Migrating VPN to Zero Trust: Supply Chain]]></title>
      <description><![CDATA[A phased playbook for retiring corporate VPN concentrators in favor of zero trust network access, with specific guidance for protecting software supply chain pipelines.]]></description>
      <link>https://safeguard.sh/resources/blog/migrating-vpn-to-zero-trust-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/migrating-vpn-to-zero-trust-supply-chain</guid>
      <pubDate>Mon, 18 Nov 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Auditing Rust unsafe Code at Scale]]></title>
      <description><![CDATA[How to actually audit unsafe blocks across a large Rust dependency graph without drowning in false positives or miss real issues.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-unsafe-code-audit-at-scale</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-unsafe-code-audit-at-scale</guid>
      <pubDate>Mon, 18 Nov 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Security Team Topology for a Supply Chain Program]]></title>
      <description><![CDATA[How to structure a supply chain security program across AppSec, platform, TPRM, and incident response with clear ownership, cadences, and escalation paths.]]></description>
      <link>https://safeguard.sh/resources/blog/security-team-topology-supply-chain-program</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-team-topology-supply-chain-program</guid>
      <pubDate>Mon, 18 Nov 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Java Modules Supply Chain Security]]></title>
      <description><![CDATA[The Java Platform Module System arrived in Java 9 and has aged into quiet maturity. What JPMS actually does for supply chain posture in enterprise Java.]]></description>
      <link>https://safeguard.sh/resources/blog/java-modules-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/java-modules-supply-chain-security</guid>
      <pubDate>Fri, 15 Nov 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[OpenSSF Launches SIREN: A Mailing List for Open Source Threat Intelligence]]></title>
      <description><![CDATA[The Open Source Security Foundation introduces SIREN, a dedicated mailing list for sharing real-time threat intelligence about attacks targeting open source ecosystems.]]></description>
      <link>https://safeguard.sh/resources/blog/openssf-siren-mailing-list-launch</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openssf-siren-mailing-list-launch</guid>
      <pubDate>Fri, 15 Nov 2024 12:00:00 GMT</pubDate>
      <category>Industry News</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Play Ransomware: Supply Chain Exploitation Through Managed Service Providers]]></title>
      <description><![CDATA[Play ransomware refined the MSP attack model, exploiting FortiOS and RDP vulnerabilities to cascade through managed service providers into hundreds of downstream organizations.]]></description>
      <link>https://safeguard.sh/resources/blog/play-ransomware-supply-chain-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/play-ransomware-supply-chain-exploitation</guid>
      <pubDate>Fri, 15 Nov 2024 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[How to Build a Vulnerability SLA Dashboard]]></title>
      <description><![CDATA[Track remediation SLAs across projects with a self-service dashboard that surfaces aging findings, breach risk, and team accountability — complete code inside.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-build-a-vulnerability-sla-dashboard</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-build-a-vulnerability-sla-dashboard</guid>
      <pubDate>Thu, 14 Nov 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Kata Containers Security Model Review]]></title>
      <description><![CDATA[Kata wraps each pod in a lightweight VM. That is a real security boundary. It is also one that comes with real costs and real caveats.]]></description>
      <link>https://safeguard.sh/resources/blog/kata-containers-security-model-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kata-containers-security-model-review</guid>
      <pubDate>Thu, 14 Nov 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Grafana Loki for Build Pipeline Logs: Patterns That Scale]]></title>
      <description><![CDATA[Design a Loki-based log pipeline for CI/CD observability and supply chain forensics. Labels, retention, LogQL patterns, and cost discipline from the field.]]></description>
      <link>https://safeguard.sh/resources/blog/grafana-loki-build-pipeline-logs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/grafana-loki-build-pipeline-logs</guid>
      <pubDate>Tue, 12 Nov 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Signing Python Wheels in Production]]></title>
      <description><![CDATA[PyPI supports attestations now. Here is how to actually sign Python wheels in a CI pipeline, verify them at install time, and deal with the rough edges.]]></description>
      <link>https://safeguard.sh/resources/blog/python-wheel-signing-production-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-wheel-signing-production-guide</guid>
      <pubDate>Tue, 12 Nov 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Code Signing Infrastructure Breach Response]]></title>
      <description><![CDATA[A compromised signing key is the quietest crisis in security. A concrete playbook for responding when your code signing infrastructure is implicated.]]></description>
      <link>https://safeguard.sh/resources/blog/code-signing-infrastructure-breach-response</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/code-signing-infrastructure-breach-response</guid>
      <pubDate>Sun, 10 Nov 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Cryptographic Bill of Materials (CBOM): The Next Frontier]]></title>
      <description><![CDATA[Post-quantum cryptography migration requires knowing what cryptographic algorithms your software uses. CBOMs provide that inventory. Here is what they are and why they matter.]]></description>
      <link>https://safeguard.sh/resources/blog/cryptographic-bill-of-materials-cbom</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cryptographic-bill-of-materials-cbom</guid>
      <pubDate>Sun, 10 Nov 2024 11:00:00 GMT</pubDate>
      <category>Standards</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Concourse CI Supply Chain Hardening]]></title>
      <description><![CDATA[A practical hardening guide for Concourse CI: resource type trust, worker isolation, team-level RBAC, and the var source security that underpins the platform's multi-tenancy model.]]></description>
      <link>https://safeguard.sh/resources/blog/concourse-ci-supply-chain-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/concourse-ci-supply-chain-hardening</guid>
      <pubDate>Fri, 08 Nov 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Earthly Containerized Builds Supply Chain]]></title>
      <description><![CDATA[Earthly combines container isolation with Makefile-style ergonomics. Here's what that means for supply chain posture, with real Earthfile examples.]]></description>
      <link>https://safeguard.sh/resources/blog/earthly-containerized-builds-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/earthly-containerized-builds-supply-chain</guid>
      <pubDate>Fri, 08 Nov 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Quality Benchmarking: What We Found in 2024]]></title>
      <description><![CDATA[We scored 1,200 production SBOMs in 2024 across CycloneDX and SPDX. The quality distribution is worse than advertised and we have the numbers.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-quality-benchmarking-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-quality-benchmarking-2024</guid>
      <pubDate>Fri, 08 Nov 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Palo Alto Expedition CVE-2024-9463: Command Injection in Migration Tool]]></title>
      <description><![CDATA[Critical command injection vulnerabilities in Palo Alto Networks Expedition tool exposed firewall credentials and configurations, with CISA confirming active exploitation in November 2024.]]></description>
      <link>https://safeguard.sh/resources/blog/palo-alto-expedition-cve-2024-9463</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/palo-alto-expedition-cve-2024-9463</guid>
      <pubDate>Thu, 07 Nov 2024 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[AWS IAM Roles Anywhere and the Supply Chain]]></title>
      <description><![CDATA[IAM Roles Anywhere lets workloads outside AWS assume IAM roles using X.509 certificates. It is also becoming the authentication layer for supply chain tools. Here is what the threat model looks like.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-iam-roles-anywhere-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-iam-roles-anywhere-supply-chain</guid>
      <pubDate>Tue, 05 Nov 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[JRuby Supply Chain Considerations]]></title>
      <description><![CDATA[JRuby sits at the intersection of the Ruby and Java supply chains, and the security story reflects both. A look at how JRuby's dual nature affects gem security and what defenders should know.]]></description>
      <link>https://safeguard.sh/resources/blog/jruby-supply-chain-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jruby-supply-chain-considerations</guid>
      <pubDate>Tue, 05 Nov 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Medusa Ransomware: How Supply Chain Infiltration Became Their Signature Move]]></title>
      <description><![CDATA[Medusa ransomware operators have refined a playbook that targets managed service providers and software vendors as stepping stones into hundreds of downstream victims.]]></description>
      <link>https://safeguard.sh/resources/blog/medusa-ransomware-supply-chain-infiltration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/medusa-ransomware-supply-chain-infiltration</guid>
      <pubDate>Tue, 05 Nov 2024 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Fog Ransomware: Why Schools and Universities Are Under Siege]]></title>
      <description><![CDATA[Fog ransomware has carved a niche by targeting educational institutions — organizations with tight budgets, thin security teams, and massive attack surfaces. Here is how they operate.]]></description>
      <link>https://safeguard.sh/resources/blog/fog-ransomware-education-sector-targeting</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fog-ransomware-education-sector-targeting</guid>
      <pubDate>Tue, 05 Nov 2024 00:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Security Tool Consolidation: Doing More With Less Without Losing Coverage]]></title>
      <description><![CDATA[The average enterprise runs 60-80 security tools. Most overlap, many go unused, and the integration tax exceeds the value. Here is how to consolidate without creating gaps.]]></description>
      <link>https://safeguard.sh/resources/blog/security-tool-consolidation-strategy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-tool-consolidation-strategy</guid>
      <pubDate>Tue, 05 Nov 2024 00:00:00 GMT</pubDate>
      <category>Security Operations</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Forking Strategy for Enterprise OSS]]></title>
      <description><![CDATA[Forking was once a last resort. In 2024 it became a standard response to license changes, governance failures, and stalled projects. A good forking strategy is now an enterprise competency.]]></description>
      <link>https://safeguard.sh/resources/blog/forking-strategy-for-enterprise-oss</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/forking-strategy-for-enterprise-oss</guid>
      <pubDate>Sat, 02 Nov 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Font File Vulnerability History: When Typography Becomes an Exploit]]></title>
      <description><![CDATA[Font parsing has been a goldmine for attackers. The history of font vulnerabilities reveals deep supply chain risks in every operating system.]]></description>
      <link>https://safeguard.sh/resources/blog/font-file-vulnerability-history</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/font-file-vulnerability-history</guid>
      <pubDate>Sat, 02 Nov 2024 10:00:00 GMT</pubDate>
      <category>Vulnerability Research</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NIST NVD Recovery: The New Consortium Reshaping Vulnerability Data]]></title>
      <description><![CDATA[After months of processing backlogs and community frustration, NIST announces a new consortium to modernize and sustain the National Vulnerability Database.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-nvd-recovery-new-consortium</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-nvd-recovery-new-consortium</guid>
      <pubDate>Fri, 01 Nov 2024 12:00:00 GMT</pubDate>
      <category>Industry News</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Reachability Analysis: Cutting Through Vulnerability Noise]]></title>
      <description><![CDATA[Not every vulnerability in your dependencies is exploitable. Safeguard's reachability analysis determines whether vulnerable code paths are actually invoked in your application.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-reachability-analysis-launch</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-reachability-analysis-launch</guid>
      <pubDate>Fri, 01 Nov 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Scoping a Vulnerability Bounty Program for Supply Chain]]></title>
      <description><![CDATA[How to scope a bug bounty program that addresses supply chain risks: in-scope assets, payout tiers, triage workflow, and avoiding the trap of dependency CVE bounties.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-bounty-program-scoping-for-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-bounty-program-scoping-for-supply-chain</guid>
      <pubDate>Wed, 30 Oct 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[age + SOPS: A Git-Native Secrets Workflow]]></title>
      <description><![CDATA[How age and SOPS together deliver a lightweight, auditable, Git-native secrets workflow that stands up to real production use without a vault server.]]></description>
      <link>https://safeguard.sh/resources/blog/age-sops-git-native-secrets-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/age-sops-git-native-secrets-workflow</guid>
      <pubDate>Mon, 28 Oct 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[EHR System Dependency Governance]]></title>
      <description><![CDATA[Electronic Health Record platforms carry decades of transitive dependencies. A practical governance model for hospitals, vendors, and compliance officers.]]></description>
      <link>https://safeguard.sh/resources/blog/ehr-system-dependency-governance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ehr-system-dependency-governance</guid>
      <pubDate>Mon, 28 Oct 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Rust Procedural Macros: Security Risks]]></title>
      <description><![CDATA[Proc macros are Rust code that runs at compile time with the privileges of the developer. They are one of the most underexamined pieces of the Rust supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-procedural-macro-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-procedural-macro-security-risks</guid>
      <pubDate>Mon, 28 Oct 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Buildkite Supply Chain Hardening]]></title>
      <description><![CDATA[A practical hardening guide for Buildkite: agent isolation, pipeline upload security, plugin risks, and the agent-token rotation strategy that keeps the trust model intact.]]></description>
      <link>https://safeguard.sh/resources/blog/buildkite-supply-chain-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/buildkite-supply-chain-hardening</guid>
      <pubDate>Fri, 25 Oct 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Differential Testing for Supply Chain Vulns]]></title>
      <description><![CDATA[Differential testing compares the behavior of multiple implementations of the same specification. In supply-chain work, it surfaces bugs that nobody else can see.]]></description>
      <link>https://safeguard.sh/resources/blog/differential-testing-supply-chain-vulnerabilities</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/differential-testing-supply-chain-vulnerabilities</guid>
      <pubDate>Fri, 25 Oct 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Foundation-Neutral Governance Evaluation]]></title>
      <description><![CDATA[CNCF, Linux Foundation, Apache, Eclipse — each has a different governance model. A practical evaluation of what that means for projects considering adoption.]]></description>
      <link>https://safeguard.sh/resources/blog/foundation-neutral-governance-evaluation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/foundation-neutral-governance-evaluation</guid>
      <pubDate>Fri, 25 Oct 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[OpenSSF Scorecard Adoption Metrics: Late 2024]]></title>
      <description><![CDATA[OpenSSF Scorecard crossed 1M scanned repos in October 2024. We break down adoption, score drift, and which checks are actually predictive.]]></description>
      <link>https://safeguard.sh/resources/blog/openssf-scorecard-adoption-metrics-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openssf-scorecard-adoption-metrics-2024</guid>
      <pubDate>Thu, 24 Oct 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cisco ASA and FTD CVE-2024-20481: Brute-Force DoS in VPN Services]]></title>
      <description><![CDATA[CVE-2024-20481 in Cisco ASA and Firepower Threat Defense VPN services was actively exploited in large-scale brute-force campaigns, causing denial of service on critical VPN infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/cisco-asa-ftd-cve-2024-20481</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisco-asa-ftd-cve-2024-20481</guid>
      <pubDate>Thu, 24 Oct 2024 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[FortiJump: CVE-2024-47575 FortiManager Zero-Day Exploited at Scale]]></title>
      <description><![CDATA[CVE-2024-47575, dubbed FortiJump, allowed unauthenticated attackers to execute commands on FortiManager devices. Mandiant confirmed exploitation by a new threat cluster targeting managed Fortinet infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/fortinet-fortimanager-cve-2024-47575</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fortinet-fortimanager-cve-2024-47575</guid>
      <pubDate>Wed, 23 Oct 2024 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Buck2 (Meta) Build Security Considerations]]></title>
      <description><![CDATA[A security engineer's look at Buck2, Meta's open-source build system, including Starlark sandbox properties, remote execution, and actual supply chain guarantees.]]></description>
      <link>https://safeguard.sh/resources/blog/buck2-meta-build-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/buck2-meta-build-security-considerations</guid>
      <pubDate>Tue, 22 Oct 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Maven Release Plugin Hardening]]></title>
      <description><![CDATA[The Maven Release Plugin is the oldest piece of release automation most Java shops still run. A look at the hardening steps it usually needs.]]></description>
      <link>https://safeguard.sh/resources/blog/maven-release-plugin-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maven-release-plugin-hardening</guid>
      <pubDate>Tue, 22 Oct 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[On-Prem to Cloud Supply Chain Continuity]]></title>
      <description><![CDATA[A year inside a financial services cloud migration, and how to keep your software supply chain intact when everything else about the environment changes.]]></description>
      <link>https://safeguard.sh/resources/blog/on-prem-to-cloud-supply-chain-continuity</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/on-prem-to-cloud-supply-chain-continuity</guid>
      <pubDate>Tue, 22 Oct 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[React Native Supply Chain Risks in 2024]]></title>
      <description><![CDATA[React Native bundles native modules, JavaScript dependencies, and CodePush-style OTA updates into one app. The supply chain is vast and the remediation path is slower than web apps. Here is where it actually goes wrong.]]></description>
      <link>https://safeguard.sh/resources/blog/react-native-supply-chain-risks-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/react-native-supply-chain-risks-2024</guid>
      <pubDate>Tue, 22 Oct 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Slack 2022-2023 Incidents: Operational Retrospective]]></title>
      <description><![CDATA[Slack disclosed a stolen-token incident over the 2022 holidays and a related GitHub repository access event; the operational lessons apply broadly.]]></description>
      <link>https://safeguard.sh/resources/blog/slack-2022-2023-incidents-operational-retrospective</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/slack-2022-2023-incidents-operational-retrospective</guid>
      <pubDate>Sun, 20 Oct 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Typosquatting Meets AI: The New Threat of AI-Generated Package Names]]></title>
      <description><![CDATA[AI code assistants recommend packages that do not exist, and attackers are registering those hallucinated names. This new typosquatting vector exploits the trust developers place in AI suggestions.]]></description>
      <link>https://safeguard.sh/resources/blog/typosquatting-ai-generated-package-names</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/typosquatting-ai-generated-package-names</guid>
      <pubDate>Sun, 20 Oct 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AWS SSM Parameter Store Security]]></title>
      <description><![CDATA[Parameter Store is everywhere in AWS workloads, which means it accumulates secrets, configuration, and bad IAM over time. Here is the security review I run on every Parameter Store deployment.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-ssm-parameter-store-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-ssm-parameter-store-security</guid>
      <pubDate>Fri, 18 Oct 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[FedRAMP Meets STIG: Practical Mapping]]></title>
      <description><![CDATA[FedRAMP wants NIST 800-53 Rev 5 controls. DISA STIGs want hardening settings. The mapping between them is what determines whether your authorization package actually clears review.]]></description>
      <link>https://safeguard.sh/resources/blog/fedramp-meets-stig-mapping-practical</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fedramp-meets-stig-mapping-practical</guid>
      <pubDate>Fri, 18 Oct 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Package Registry Forensic Log Analysis]]></title>
      <description><![CDATA[Extracting investigative signal from package registry logs — publish events, download patterns, and account activity — during a supply chain incident.]]></description>
      <link>https://safeguard.sh/resources/blog/package-registry-forensic-log-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/package-registry-forensic-log-analysis</guid>
      <pubDate>Fri, 18 Oct 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Panther SIEM Supply Chain Rules: A Detection Engineering Playbook]]></title>
      <description><![CDATA[Write Panther Python detections that catch package poisoning, CI token abuse, and registry compromise. Real rule examples, tuning patterns, and alert routing.]]></description>
      <link>https://safeguard.sh/resources/blog/panther-siem-supply-chain-rules</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/panther-siem-supply-chain-rules</guid>
      <pubDate>Fri, 18 Oct 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CISA's SBOM Sharing Lifecycle: A Framework for Practical Adoption]]></title>
      <description><![CDATA[CISA releases updated guidance on SBOM sharing practices, addressing the full lifecycle from generation to consumption across supplier and buyer relationships.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-sbom-sharing-lifecycle-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-sbom-sharing-lifecycle-2024</guid>
      <pubDate>Tue, 15 Oct 2024 12:00:00 GMT</pubDate>
      <category>Compliance & Frameworks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[go generate Supply Chain Risks]]></title>
      <description><![CDATA[go generate is a seam where arbitrary commands run with the full privileges of the developer, and it does not show up in any manifest of trusted dependencies.]]></description>
      <link>https://safeguard.sh/resources/blog/go-generate-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-generate-supply-chain-risks</guid>
      <pubDate>Tue, 15 Oct 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SLSA Build Provenance for Python Publish]]></title>
      <description><![CDATA[Python packages on PyPI can carry SLSA provenance via PEP 740. Here is the publish workflow, the verification story, and the parts that still do not quite fit together.]]></description>
      <link>https://safeguard.sh/resources/blog/slsa-build-provenance-for-python-publish</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/slsa-build-provenance-for-python-publish</guid>
      <pubDate>Tue, 15 Oct 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[State and Local Government SBOM Mandates]]></title>
      <description><![CDATA[States and cities are adopting SBOM requirements faster than most vendors have noticed. A survey of where the mandates sit and what they actually require.]]></description>
      <link>https://safeguard.sh/resources/blog/state-local-government-sbom-mandates</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/state-local-government-sbom-mandates</guid>
      <pubDate>Tue, 15 Oct 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Security Testing for LLM-Powered Applications]]></title>
      <description><![CDATA[Applications built on large language models introduce novel attack surfaces that traditional security testing does not cover. This guide addresses the specific testing methodologies needed for LLM applications.]]></description>
      <link>https://safeguard.sh/resources/blog/llm-application-security-testing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/llm-application-security-testing</guid>
      <pubDate>Tue, 15 Oct 2024 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CycloneDX and SPDX: Why Safeguard Supports Both and How We Normalize Between Them]]></title>
      <description><![CDATA[The SBOM format debate misses the point. Safeguard ingests both CycloneDX and SPDX, normalizes to a common model, and lets you query and export in either format.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-cyclonedx-spdx-dual-support</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-cyclonedx-spdx-dual-support</guid>
      <pubDate>Tue, 15 Oct 2024 10:00:00 GMT</pubDate>
      <category>Engineering</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[dotnet restore Reproducibility Concerns]]></title>
      <description><![CDATA[dotnet restore is supposed to be deterministic. In practice it is deterministic in ways that matter less and non-deterministic in ways that matter more.]]></description>
      <link>https://safeguard.sh/resources/blog/dotnet-restore-reproducibility-concerns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dotnet-restore-reproducibility-concerns</guid>
      <pubDate>Sat, 12 Oct 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Azure App Service Deployment Security]]></title>
      <description><![CDATA[App Service deployments are easy, which is the problem. A look at the deployment paths, credential surfaces, and hardening steps that matter for production workloads.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-app-service-deployment-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-app-service-deployment-security</guid>
      <pubDate>Thu, 10 Oct 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Kimsuky Developer Targeting Analysis]]></title>
      <description><![CDATA[Kimsuky has pivoted from diplomats to developers. A look at the tradecraft behind its supply-chain-flavored operations and what engineering orgs should do about it.]]></description>
      <link>https://safeguard.sh/resources/blog/kimsuky-developer-targeting-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kimsuky-developer-targeting-analysis</guid>
      <pubDate>Thu, 10 Oct 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[EU Cyber Resilience Act: Final Text Analysis and Compliance Roadmap]]></title>
      <description><![CDATA[The EU Cyber Resilience Act was finalized in 2024, mandating cybersecurity requirements and SBOMs for products with digital elements. Here is what the final text requires and how to prepare.]]></description>
      <link>https://safeguard.sh/resources/blog/eu-cyber-resilience-act-final-text-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eu-cyber-resilience-act-final-text-analysis</guid>
      <pubDate>Thu, 10 Oct 2024 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[How to Rotate Build Signing Keys Safely]]></title>
      <description><![CDATA[A step-by-step tutorial for rotating Cosign and GPG build signing keys without breaking existing attestations, verification chains, or downstream consumers.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-rotate-build-signing-keys-safely</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-rotate-build-signing-keys-safely</guid>
      <pubDate>Tue, 08 Oct 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Ruby Native Extensions Supply Chain]]></title>
      <description><![CDATA[Native C extensions are the most under-audited part of the Ruby supply chain: how they get built, what can go wrong, and how to monitor them as seriously as you monitor pure-Ruby code.]]></description>
      <link>https://safeguard.sh/resources/blog/ruby-native-extensions-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ruby-native-extensions-supply-chain</guid>
      <pubDate>Tue, 08 Oct 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Docker Hub Rate Limit Changes and CI Impact]]></title>
      <description><![CDATA[Docker's 2024 rate-limit reforms hit CI pipelines hard. Measured impact on 30 real build farms and the mirror and pull-through controls that fixed it.]]></description>
      <link>https://safeguard.sh/resources/blog/docker-hub-rate-limit-policy-changes-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/docker-hub-rate-limit-policy-changes-2024</guid>
      <pubDate>Thu, 03 Oct 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GCP Pub/Sub Security Configuration]]></title>
      <description><![CDATA[A working security configuration for GCP Pub/Sub: topic and subscription IAM, message encryption, VPC Service Controls, dead-letter handling, and the failure modes that turn a messaging layer into an attack surface.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-pub-sub-security-configuration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-pub-sub-security-configuration</guid>
      <pubDate>Wed, 02 Oct 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard v3: Compliance-First Supply Chain Security]]></title>
      <description><![CDATA[Safeguard v3 adds compliance framework mapping, automated evidence collection, audit-ready reporting, and VEX document support for regulatory readiness.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-v3-release-compliance-features</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-v3-release-compliance-features</guid>
      <pubDate>Tue, 01 Oct 2024 10:00:00 GMT</pubDate>
      <category>Release</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Adoption in 2024: Enterprise Survey Results and Reality Check]]></title>
      <description><![CDATA[Despite growing regulatory pressure, enterprise SBOM adoption remains uneven. A look at where organizations actually stand with SBOM generation, consumption, and operationalization.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-adoption-rates-enterprise-survey-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-adoption-rates-enterprise-survey-2024</guid>
      <pubDate>Tue, 01 Oct 2024 09:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[GraphQL Supply Chain Security Considerations]]></title>
      <description><![CDATA[Supply chain risks specific to GraphQL stacks: Apollo, graphql-js, persisted queries, introspection, and transitive risk in gateway federation.]]></description>
      <link>https://safeguard.sh/resources/blog/graphql-supply-chain-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/graphql-supply-chain-security-considerations</guid>
      <pubDate>Mon, 30 Sep 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Volt Typhoon: Living-Off-the-Land and Supply Chain]]></title>
      <description><![CDATA[The PRC-linked pre-positioning group that scared DHS and the NSA into a public warning, and what it means for supply chain defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/volt-typhoon-living-off-the-land-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/volt-typhoon-living-off-the-land-supply-chain</guid>
      <pubDate>Mon, 30 Sep 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GCP Binary Authorization Policy Patterns]]></title>
      <description><![CDATA[Policy design patterns for GCP Binary Authorization that hold up in production: attestor topology, exception handling, continuous validation, and the shapes that stop a deploy-time compromise without blocking legitimate rollouts.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-binary-authorization-policy-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-binary-authorization-policy-patterns</guid>
      <pubDate>Sat, 28 Sep 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CUPS Vulnerability Chain: Remote Code Execution via Linux Printing]]></title>
      <description><![CDATA[A chain of vulnerabilities in the CUPS printing system allows unauthenticated attackers to achieve remote code execution on Linux systems by exploiting how printers are discovered and configured.]]></description>
      <link>https://safeguard.sh/resources/blog/cups-linux-rce-vulnerability-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cups-linux-rce-vulnerability-chain</guid>
      <pubDate>Thu, 26 Sep 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AWS CDK Construct Library Security]]></title>
      <description><![CDATA[CDK constructs are code that provisions infrastructure. Most teams audit the infrastructure but not the constructs. Here is how to think about construct library security and what to check.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-cdk-construct-library-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-cdk-construct-library-security</guid>
      <pubDate>Wed, 25 Sep 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Doppler Enterprise Secrets Platform Reviewed]]></title>
      <description><![CDATA[Doppler pitches itself as the secrets platform that gets out of developers' way. A detailed look at what works, what does not, and the trade-offs against Vault, Infisical, and the cloud-native options.]]></description>
      <link>https://safeguard.sh/resources/blog/doppler-enterprise-secrets-platform-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/doppler-enterprise-secrets-platform-review</guid>
      <pubDate>Sun, 22 Sep 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Foundation Governance Models]]></title>
      <description><![CDATA[The Linux Foundation, Apache Software Foundation, CNCF, and Eclipse each codify different theories of how open source projects should be governed. The differences matter more than most adopters realize.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-foundation-governance-models</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-foundation-governance-models</guid>
      <pubDate>Sun, 22 Sep 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Witness Attestation Collection Workflow]]></title>
      <description><![CDATA[Witness turns build steps into a chain of signed attestations. Here is how we use it in production pipelines, what it does well, and where the edges still cut.]]></description>
      <link>https://safeguard.sh/resources/blog/witness-attestation-collection-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/witness-attestation-collection-workflow</guid>
      <pubDate>Sun, 22 Sep 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Ransomware-as-a-Service in 2024: The Ecosystem That Won't Die]]></title>
      <description><![CDATA[The RaaS ecosystem proved resilient through 2024 despite major law enforcement takedowns, with new groups filling every gap and affiliate models becoming more sophisticated.]]></description>
      <link>https://safeguard.sh/resources/blog/ransomware-as-a-service-ecosystem-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ransomware-as-a-service-ecosystem-2024</guid>
      <pubDate>Sun, 22 Sep 2024 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Fastify Security Posture in 2024]]></title>
      <description><![CDATA[Fastify hit version 5.0 in September 2024 with a slimmer core, a plugin model that encourages correctness, and a security track record that genuinely distinguishes it from the Express crowd. Here is what I have learned auditing Fastify apps this year.]]></description>
      <link>https://safeguard.sh/resources/blog/fastify-security-posture-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fastify-security-posture-2024</guid>
      <pubDate>Fri, 20 Sep 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes 1.30 and 1.31 Security Rundown]]></title>
      <description><![CDATA[ValidatingAdmissionPolicy GA, VolumeSource for OCI artifacts, and anonymous API cleanup: what 1.30 and 1.31 change for cluster security posture.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-1-30-and-1-31-security-rundown</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-1-30-and-1-31-security-rundown</guid>
      <pubDate>Fri, 20 Sep 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[RubyGems.org and Sigstore: Progress Check]]></title>
      <description><![CDATA[An honest look at where RubyGems.org stands with Sigstore integration, what has shipped, what is still being debated, and how maintainers can prepare for signed gems.]]></description>
      <link>https://safeguard.sh/resources/blog/rubygems-org-sigstore-integration-progress</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rubygems-org-sigstore-integration-progress</guid>
      <pubDate>Fri, 20 Sep 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cloud Workload Protection Platforms in 2024: What Actually Matters]]></title>
      <description><![CDATA[Cutting through the CWPP marketing noise to identify the capabilities that genuinely protect cloud workloads from modern threats.]]></description>
      <link>https://safeguard.sh/resources/blog/cloud-workload-protection-platforms-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloud-workload-protection-platforms-2024</guid>
      <pubDate>Fri, 20 Sep 2024 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Qilin Ransomware and the Chrome Credential Harvesting Gambit]]></title>
      <description><![CDATA[Qilin ransomware operators pioneered a mass credential theft technique using Group Policy to extract saved Chrome browser credentials across entire domains.]]></description>
      <link>https://safeguard.sh/resources/blog/qilin-ransomware-credential-harvesting-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/qilin-ransomware-credential-harvesting-techniques</guid>
      <pubDate>Fri, 20 Sep 2024 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Dagger.io Supply Chain Pipelines]]></title>
      <description><![CDATA[Dagger programmatic pipelines offer genuine supply chain benefits when used well. Here are the patterns and pitfalls from running Dagger in production.]]></description>
      <link>https://safeguard.sh/resources/blog/dagger-io-supply-chain-pipelines</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dagger-io-supply-chain-pipelines</guid>
      <pubDate>Wed, 18 Sep 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Database Platform Migration: Supply Chain]]></title>
      <description><![CDATA[Database migrations touch every part of the software supply chain. This guide covers how to keep schemas, secrets, and data lineage secure during a platform change.]]></description>
      <link>https://safeguard.sh/resources/blog/database-platform-migration-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/database-platform-migration-supply-chain</guid>
      <pubDate>Wed, 18 Sep 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GitGuardian vs TruffleHog: Secret Detection Showdown]]></title>
      <description><![CDATA[Compare GitGuardian and TruffleHog on detector coverage, validation, historical scans, developer workflow, and pricing to pick the right secret scanning tool.]]></description>
      <link>https://safeguard.sh/resources/blog/gitguardian-vs-trufflehog-secret-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gitguardian-vs-trufflehog-secret-detection</guid>
      <pubDate>Wed, 18 Sep 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Public-Sector Software Procurement Requirements]]></title>
      <description><![CDATA[A tour through the attestations, self-certifications, and supply chain obligations that now shape how governments buy software.]]></description>
      <link>https://safeguard.sh/resources/blog/public-sector-software-procurement-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/public-sector-software-procurement-requirements</guid>
      <pubDate>Wed, 18 Sep 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Typosquatting Detection at Scale]]></title>
      <description><![CDATA[Typosquatting remains a steady drumbeat on PyPI. What detection actually looks like when you're trying to catch it at ecosystem scale, and where the interesting edges are.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-typosquatting-detection-at-scale</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-typosquatting-detection-at-scale</guid>
      <pubDate>Wed, 18 Sep 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Service Mesh Policy Depth]]></title>
      <description><![CDATA[Service meshes promise layered policy. The promise is real, but the layers only help if you use them, and most deployments use one.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-service-mesh-policy-depth</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-service-mesh-policy-depth</guid>
      <pubDate>Sun, 15 Sep 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[LastPass 2022-2023: A Retrospective at Depth]]></title>
      <description><![CDATA[A detailed walk through the two LastPass breaches of 2022 and their long 2023 tail, reconstructing how a developer laptop became a vault disclosure.]]></description>
      <link>https://safeguard.sh/resources/blog/lastpass-2022-2023-retrospective-depth</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lastpass-2022-2023-retrospective-depth</guid>
      <pubDate>Sun, 15 Sep 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Intelligence Platforms Compared for Supply Chain Security]]></title>
      <description><![CDATA[Vulnerability intelligence platforms aggregate, enrich, and prioritize vulnerability data. This comparison examines how leading platforms handle supply chain-specific intelligence needs.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-intelligence-platform-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-intelligence-platform-comparison</guid>
      <pubDate>Sun, 15 Sep 2024 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[INC Ransom: Inside the Group Targeting Healthcare Infrastructure]]></title>
      <description><![CDATA[INC Ransom has made healthcare a primary target, exploiting the sector's unique vulnerabilities and urgency. A deep dive into their operations and what healthcare security teams should prioritize.]]></description>
      <link>https://safeguard.sh/resources/blog/inc-ransom-group-healthcare-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/inc-ransom-group-healthcare-attacks</guid>
      <pubDate>Sun, 15 Sep 2024 00:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[How to Validate SLSA Provenance in CI]]></title>
      <description><![CDATA[Generate and validate SLSA v1.0 provenance attestations in GitHub Actions using slsa-verifier, gate releases on builder identity, and prove build integrity.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-validate-slsa-provenance-in-ci</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-validate-slsa-provenance-in-ci</guid>
      <pubDate>Sat, 14 Sep 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PCI DSS Meets SBOM Requirements]]></title>
      <description><![CDATA[PCI DSS v4.0.1 doesn't say the word SBOM, but its software inventory and vulnerability management requirements make one effectively mandatory. Here's how to build an SBOM program that passes a QSA review.]]></description>
      <link>https://safeguard.sh/resources/blog/pci-dss-meets-sbom-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pci-dss-meets-sbom-requirements</guid>
      <pubDate>Sat, 14 Sep 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain IoC Catalog]]></title>
      <description><![CDATA[A practical catalog of indicators of compromise for software supply chain attacks, with detection queries and false-positive notes.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-indicator-of-compromise-catalog</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-indicator-of-compromise-catalog</guid>
      <pubDate>Sat, 14 Sep 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Ivanti Cloud Services Appliance CVE-2024-8963: Chained Exploitation]]></title>
      <description><![CDATA[Ivanti's Cloud Services Appliance faced chained zero-day exploitation in September 2024, with attackers combining path traversal and command injection for unauthenticated RCE.]]></description>
      <link>https://safeguard.sh/resources/blog/ivanti-csa-cve-2024-8963-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ivanti-csa-cve-2024-8963-exploitation</guid>
      <pubDate>Fri, 13 Sep 2024 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Healthtech FDA Software Supply Chain Guidance]]></title>
      <description><![CDATA[The FDA's cybersecurity guidance has quietly turned into one of the most consequential supply chain regulations in US software. A walkthrough for engineering teams shipping connected medical products.]]></description>
      <link>https://safeguard.sh/resources/blog/healthtech-fda-software-supply-chain-guidance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/healthtech-fda-software-supply-chain-guidance</guid>
      <pubDate>Thu, 12 Sep 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Rust Feature Flags: Supply Chain Implications]]></title>
      <description><![CDATA[Cargo feature flags look like a compilation convenience but they are a load-bearing piece of your supply chain posture. Here is why.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-feature-flags-supply-chain-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-feature-flags-supply-chain-implications</guid>
      <pubDate>Thu, 12 Sep 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GitLab Pipeline Execution Vulnerability CVE-2024-6678: Running Pipelines as Any User]]></title>
      <description><![CDATA[CVE-2024-6678 allowed attackers to trigger GitLab CI/CD pipelines as arbitrary users, potentially accessing secrets and deploying malicious code through impersonated pipeline runs.]]></description>
      <link>https://safeguard.sh/resources/blog/gitlab-pipeline-execution-cve-2024-6678</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gitlab-pipeline-execution-cve-2024-6678</guid>
      <pubDate>Thu, 12 Sep 2024 11:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[FluxCD Security Model in Production]]></title>
      <description><![CDATA[A production-focused look at FluxCD's security model, covering multi-tenancy isolation, source verification, image automation risks, and the CVE history behind the current defaults.]]></description>
      <link>https://safeguard.sh/resources/blog/fluxcd-security-model-production</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fluxcd-security-model-production</guid>
      <pubDate>Tue, 10 Sep 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Jenkins + Maven Integration Security]]></title>
      <description><![CDATA[Jenkins is still the most common Maven build driver in enterprise Java shops. It is also where most supply chain incidents start. Here is what to change before it becomes your problem.]]></description>
      <link>https://safeguard.sh/resources/blog/jenkins-maven-integration-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jenkins-maven-integration-security</guid>
      <pubDate>Sun, 08 Sep 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Office Document Macro Security: The Attack Vector That Will Not Die]]></title>
      <description><![CDATA[Microsoft disabled macros by default in 2022. Attackers adapted. The macro threat has evolved, not disappeared.]]></description>
      <link>https://safeguard.sh/resources/blog/office-document-macro-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/office-document-macro-security</guid>
      <pubDate>Sun, 08 Sep 2024 10:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Python Package Typosquatting in 2024: Scale, Tactics, and Defenses]]></title>
      <description><![CDATA[Typosquatting on PyPI reached industrial scale in 2024, with attackers using automated tooling to register thousands of malicious package names targeting common misspellings of popular libraries.]]></description>
      <link>https://safeguard.sh/resources/blog/python-package-typosquatting-2024-report</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-package-typosquatting-2024-report</guid>
      <pubDate>Sun, 08 Sep 2024 10:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Datadog Security for Supply Chain Monitoring]]></title>
      <description><![CDATA[Using Datadog's Cloud SIEM, ASM, and logs pipeline to monitor software supply chain threats across CI/CD, registries, and runtime.]]></description>
      <link>https://safeguard.sh/resources/blog/datadog-security-supply-chain-monitoring</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/datadog-security-supply-chain-monitoring</guid>
      <pubDate>Sun, 08 Sep 2024 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cisco ASA Firepower Zero-Day Trends, 2024 Edition]]></title>
      <description><![CDATA[Six zero-days against ASA and FTD in 2024, two tied to ArcaneDoor. We chart the trend, the CVSS distribution, and the patch-to-exploit gap.]]></description>
      <link>https://safeguard.sh/resources/blog/cisco-asa-firepower-zero-day-trends-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisco-asa-firepower-zero-day-trends-2024</guid>
      <pubDate>Thu, 05 Sep 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[.NET Source Generator Security Risks]]></title>
      <description><![CDATA[Source generators are C# code that executes during compilation with developer privileges. The .NET equivalent of Rust's proc macros — and the same underexamined attack surface.]]></description>
      <link>https://safeguard.sh/resources/blog/dotnet-source-generator-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dotnet-source-generator-security-risks</guid>
      <pubDate>Thu, 05 Sep 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Migrating to npm Granular Access Tokens]]></title>
      <description><![CDATA[Granular access tokens have been GA for over a year. Here is the migration playbook that has worked for me across four organizations, including the gotchas nobody writes down.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-granular-access-tokens-migration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-granular-access-tokens-migration</guid>
      <pubDate>Thu, 05 Sep 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cross-Platform App Supply Chain Risks You Cannot Ignore]]></title>
      <description><![CDATA[Cross-platform frameworks multiply supply chain attack surfaces by combining multiple dependency ecosystems. Understanding these compounded risks is essential for modern mobile and desktop security.]]></description>
      <link>https://safeguard.sh/resources/blog/cross-platform-app-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cross-platform-app-supply-chain-risks</guid>
      <pubDate>Thu, 05 Sep 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[North Korean Threat Actors Flood npm with Malicious Packages]]></title>
      <description><![CDATA[In 2024, DPRK-linked groups dramatically escalated their campaign to compromise developers through malicious npm packages, using fake job offers and typosquatting to deploy infostealers and backdoors.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-malicious-packages-north-korea-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-malicious-packages-north-korea-2024</guid>
      <pubDate>Sun, 01 Sep 2024 08:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Trusted Publishing: An Adoption Guide]]></title>
      <description><![CDATA[Trusted Publishing replaces long-lived PyPI tokens with OIDC-issued short-lived credentials. A practical guide to adoption, pitfalls, and what it changes for your threat model.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-trusted-publishing-adoption-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-trusted-publishing-adoption-guide</guid>
      <pubDate>Fri, 30 Aug 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Build Server Compromise Investigation]]></title>
      <description><![CDATA[A hands-on investigation guide for compromised build servers, from initial containment through rootkit checks and clean rebuild.]]></description>
      <link>https://safeguard.sh/resources/blog/build-server-compromise-investigation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/build-server-compromise-investigation</guid>
      <pubDate>Wed, 28 Aug 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CCPA Meets Software Supply Chain]]></title>
      <description><![CDATA[CCPA and CPRA are mostly about data rights, but the reasonable-security provisions and service-provider obligations reach deep into software supply chain practice. Here's how the two connect.]]></description>
      <link>https://safeguard.sh/resources/blog/ccpa-meets-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ccpa-meets-software-supply-chain</guid>
      <pubDate>Wed, 28 Aug 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Labyrinth Chollima and Open Source Targeting]]></title>
      <description><![CDATA[Labyrinth Chollima's operations show a specific pattern — poisoned open source packages as initial access. A profile of the tradecraft and the defensive response.]]></description>
      <link>https://safeguard.sh/resources/blog/labyrinth-chollima-open-source-targeting</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/labyrinth-chollima-open-source-targeting</guid>
      <pubDate>Wed, 28 Aug 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Legacy COBOL Supply Chain Modernization: A Pragmatic Playbook]]></title>
      <description><![CDATA[Modernize the supply chain around COBOL systems without rewriting them. Build provenance, SBOMs, and policy gates for mainframe code that is not going anywhere.]]></description>
      <link>https://safeguard.sh/resources/blog/legacy-cobol-supply-chain-modernization</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/legacy-cobol-supply-chain-modernization</guid>
      <pubDate>Wed, 28 Aug 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Please Build System Security Review]]></title>
      <description><![CDATA[A hands-on security review of Please, the open-source Bazel-inspired build system, including sandbox behavior, BUILD rules, and supply chain trade-offs.]]></description>
      <link>https://safeguard.sh/resources/blog/please-build-system-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/please-build-system-security-review</guid>
      <pubDate>Wed, 28 Aug 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SLSA Builder Requirements in Production]]></title>
      <description><![CDATA[The SLSA specification sets explicit requirements for builders at each level. Here is what those requirements actually mean when you operate a builder in production.]]></description>
      <link>https://safeguard.sh/resources/blog/slsa-builder-requirements-production</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/slsa-builder-requirements-production</guid>
      <pubDate>Wed, 28 Aug 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[A Framework for Security Patch Prioritization]]></title>
      <description><![CDATA[You cannot patch everything immediately. Here is a risk-based framework for deciding which patches to apply first when your vulnerability backlog exceeds your capacity.]]></description>
      <link>https://safeguard.sh/resources/blog/security-patch-prioritization-framework</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-patch-prioritization-framework</guid>
      <pubDate>Wed, 28 Aug 2024 09:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[UK NCSC Software Supply Chain Guidance Update]]></title>
      <description><![CDATA[The UK NCSC expanded its supply chain guidance in 2023-2024, aligning with the Cyber Security and Resilience Bill and pushing SBOMs, vendor assurance, and provenance controls.]]></description>
      <link>https://safeguard.sh/resources/blog/uk-ncsc-software-supply-chain-guidance-update</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/uk-ncsc-software-supply-chain-guidance-update</guid>
      <pubDate>Mon, 26 Aug 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Azure Bicep vs ARM: Security Comparison]]></title>
      <description><![CDATA[Bicep and ARM templates produce the same deployments, but their security properties diverge — in module provenance, what-if analysis, registry trust, and review experience.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-bicep-vs-arm-security-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-bicep-vs-arm-security-comparison</guid>
      <pubDate>Sun, 25 Aug 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CyberArk Conjur for Enterprise Secrets Management]]></title>
      <description><![CDATA[Where Conjur fits in 2024 for enterprise secrets management, what it does well, where it hurts, and how to roll it out without drowning the platform team.]]></description>
      <link>https://safeguard.sh/resources/blog/conjur-secrets-management-enterprise</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/conjur-secrets-management-enterprise</guid>
      <pubDate>Sun, 25 Aug 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[RubyGems Typosquatting Incidents: 2024]]></title>
      <description><![CDATA[A running ledger of typosquat incidents on RubyGems.org through 2024, the patterns across them, and what the year's data says about where the registry's defenses still fall short.]]></description>
      <link>https://safeguard.sh/resources/blog/rubygems-typosquatting-incidents-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rubygems-typosquatting-incidents-2024</guid>
      <pubDate>Sun, 25 Aug 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CRI-O vs containerd: Security Comparison]]></title>
      <description><![CDATA[Both are CNCF graduated runtimes. Both run production clusters. Their security properties diverge in ways that matter for hardened environments.]]></description>
      <link>https://safeguard.sh/resources/blog/cri-o-vs-containerd-security-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cri-o-vs-containerd-security-comparison</guid>
      <pubDate>Thu, 22 Aug 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Rust Tokio Dependency Security Review]]></title>
      <description><![CDATA[Tokio is the async runtime underneath most production Rust. A supply chain review of Tokio and the crates that orbit it — dependencies, CVE history, and what changes across versions.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-tokio-dependency-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-tokio-dependency-security-review</guid>
      <pubDate>Thu, 22 Aug 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Static Analysis False-Positive Reduction]]></title>
      <description><![CDATA[A technique-by-technique tour of how modern static analyzers cut false positives, from CodeQL's path pruning to Infer's bi-abduction.]]></description>
      <link>https://safeguard.sh/resources/blog/static-analysis-false-positive-reduction-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/static-analysis-false-positive-reduction-techniques</guid>
      <pubDate>Thu, 22 Aug 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SonicWall SSL VPN CVE-2024-40766: Ransomware's Favorite Front Door]]></title>
      <description><![CDATA[CVE-2024-40766 in SonicWall SonicOS became an immediate target for Akira and Fog ransomware groups, highlighting the ongoing risk of VPN appliance vulnerabilities.]]></description>
      <link>https://safeguard.sh/resources/blog/sonicwall-sslvpn-cve-2024-40766</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sonicwall-sslvpn-cve-2024-40766</guid>
      <pubDate>Thu, 22 Aug 2024 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Zig's Memory Safety Model: A Security Analysis for Systems Programmers]]></title>
      <description><![CDATA[Zig offers memory safety features that C lacks but does not go as far as Rust. For security-critical code, understanding where Zig sits on the safety spectrum matters.]]></description>
      <link>https://safeguard.sh/resources/blog/zig-language-memory-safety-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zig-language-memory-safety-security</guid>
      <pubDate>Thu, 22 Aug 2024 00:00:00 GMT</pubDate>
      <category>Language Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Telemedicine Supply Chain Privacy and Security]]></title>
      <description><![CDATA[Telehealth platforms depend on video SDKs, third-party transcription, and mobile frameworks. A regulatory walkthrough for HIPAA-covered virtual care.]]></description>
      <link>https://safeguard.sh/resources/blog/telemedicine-supply-chain-privacy-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/telemedicine-supply-chain-privacy-security</guid>
      <pubDate>Tue, 20 Aug 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Incident Response Playbook: Supply Chain Compromise]]></title>
      <description><![CDATA[A step-by-step playbook for responding to upstream dependency, build system, and vendor compromises, including roles, timelines, and stakeholder communications.]]></description>
      <link>https://safeguard.sh/resources/blog/incident-response-playbook-supply-chain-compromise</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/incident-response-playbook-supply-chain-compromise</guid>
      <pubDate>Mon, 19 Aug 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Gradle Version Catalogs Security]]></title>
      <description><![CDATA[Gradle version catalogs centralise dependency versions in one file. The security payoff is concrete: auditability, uniform enforcement, and a single PR gate.]]></description>
      <link>https://safeguard.sh/resources/blog/gradle-version-catalogs-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gradle-version-catalogs-security</guid>
      <pubDate>Sun, 18 Aug 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Spinnaker Deployment Security Patterns]]></title>
      <description><![CDATA[Practical security patterns for Spinnaker deployments: account isolation, pipeline template governance, artifact binding, and the CVE history behind the current authentication defaults.]]></description>
      <link>https://safeguard.sh/resources/blog/spinnaker-deployment-security-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spinnaker-deployment-security-patterns</guid>
      <pubDate>Sun, 18 Aug 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The GitHub Dependabot Token Incident: Retrospective]]></title>
      <description><![CDATA[In 2023, attackers used stolen GitHub personal access tokens to push malicious commits masquerading as Dependabot; a short-sharp incident with lasting lessons.]]></description>
      <link>https://safeguard.sh/resources/blog/github-dependabot-token-incident-retrospective</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-dependabot-token-incident-retrospective</guid>
      <pubDate>Thu, 15 Aug 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[New Relic Security: Building a Supply Chain View]]></title>
      <description><![CDATA[How to extend New Relic's APM and Vulnerability Management features into a working software supply chain dashboard for security and platform teams.]]></description>
      <link>https://safeguard.sh/resources/blog/new-relic-security-supply-chain-view</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/new-relic-security-supply-chain-view</guid>
      <pubDate>Thu, 15 Aug 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[NuGet Package Vulnerabilities Dashboard]]></title>
      <description><![CDATA[Listing every CVE in your NuGet dependency tree is easy. Turning it into a dashboard someone can act on is the work. A practical design.]]></description>
      <link>https://safeguard.sh/resources/blog/nuget-package-vulnerabilities-dashboard</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nuget-package-vulnerabilities-dashboard</guid>
      <pubDate>Thu, 15 Aug 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes 1.31 Security Improvements: What You Need to Know]]></title>
      <description><![CDATA[Kubernetes 1.31 'Elli' shipped in August 2024 with significant security improvements including AppArmor GA support, refined pod security controls, and better secret management.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-1-31-security-improvements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-1-31-security-improvements</guid>
      <pubDate>Thu, 15 Aug 2024 11:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Deep Dive: Safeguard Container Scanning]]></title>
      <description><![CDATA[Container images are supply chain artifacts. Safeguard's container scanning analyzes every layer -- base images, OS packages, and application dependencies -- for a complete risk picture.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-container-scanning-launch</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-container-scanning-launch</guid>
      <pubDate>Thu, 15 Aug 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Security Data Lake Architecture for Supply Chain Intelligence]]></title>
      <description><![CDATA[A security data lake aggregates SBOMs, vulnerability data, build provenance, and runtime signals into a queryable store. This architecture enables the cross-cutting analysis that siloed tools cannot provide.]]></description>
      <link>https://safeguard.sh/resources/blog/security-data-lake-architecture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-data-lake-architecture</guid>
      <pubDate>Thu, 15 Aug 2024 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Go Toolchain Distribution Security]]></title>
      <description><![CDATA[The Go toolchain directive can automatically download and run a different compiler version than the one your developers installed, which is convenient, reproducible, and worth understanding as a supply chain surface.]]></description>
      <link>https://safeguard.sh/resources/blog/go-toolchain-distribution-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-toolchain-distribution-security</guid>
      <pubDate>Wed, 14 Aug 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SolarWinds Post-Incident Governance Changes Reviewed]]></title>
      <description><![CDATA[Four years after SUNBURST, SolarWinds has rebuilt its SDLC around signed pipelines, parallel builds, and a new CSO office. How much of it is real?]]></description>
      <link>https://safeguard.sh/resources/blog/solarwinds-post-incident-governance-changes</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/solarwinds-post-incident-governance-changes</guid>
      <pubDate>Wed, 14 Aug 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SvelteKit Supply Chain Considerations]]></title>
      <description><![CDATA[SvelteKit's compiled-output philosophy gives it a smaller runtime footprint than React frameworks, but the build-time supply chain is just as complex. Here is what to watch for when you adopt Svelte in production.]]></description>
      <link>https://safeguard.sh/resources/blog/svelte-kit-supply-chain-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/svelte-kit-supply-chain-considerations</guid>
      <pubDate>Wed, 14 Aug 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Actions Artifact Poisoning: A Growing Supply Chain Attack Vector]]></title>
      <description><![CDATA[Researchers disclosed techniques to poison GitHub Actions artifacts, enabling code execution in CI/CD pipelines of downstream projects. The attack exploits trust assumptions in artifact sharing.]]></description>
      <link>https://safeguard.sh/resources/blog/github-actions-artifact-poisoning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-actions-artifact-poisoning</guid>
      <pubDate>Mon, 12 Aug 2024 11:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[AWS Step Functions Workflow Security]]></title>
      <description><![CDATA[Step Functions workflows orchestrate everything from data pipelines to security automations. The workflow IAM role is almost always the most powerful thing in the stack. Here is how to lock it down.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-stepfunctions-workflow-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-stepfunctions-workflow-security</guid>
      <pubDate>Sat, 10 Aug 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[OSS Trademark Policies: Security Angle]]></title>
      <description><![CDATA[Trademarks matter in open source security because they are the signal of authentic origin. When trademark policies fail, typosquatting, impostor forks, and compromised builds follow.]]></description>
      <link>https://safeguard.sh/resources/blog/oss-trademark-policies-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/oss-trademark-policies-security-considerations</guid>
      <pubDate>Sat, 10 Aug 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Compliance Automation Tools Compared: What Actually Reduces Audit Pain in 2024]]></title>
      <description><![CDATA[The compliance automation market is crowded with platforms promising to make audits painless. Here is an honest comparison of what works, what does not, and where supply chain compliance fits in.]]></description>
      <link>https://safeguard.sh/resources/blog/compliance-automation-tools-comparison-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/compliance-automation-tools-comparison-2024</guid>
      <pubDate>Sat, 10 Aug 2024 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Aviation RTCA DO-326A and the Software Supply Chain]]></title>
      <description><![CDATA[How DO-326A and DO-356A reframe airworthiness security around the supply chain, and what engineering teams must deliver to survive certification.]]></description>
      <link>https://safeguard.sh/resources/blog/aviation-rtca-do-326a-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aviation-rtca-do-326a-supply-chain</guid>
      <pubDate>Thu, 08 Aug 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Rhysida Ransomware: Systematic Targeting of Government and Critical Infrastructure]]></title>
      <description><![CDATA[Rhysida ransomware distinguished itself through deliberate targeting of government agencies, education institutions, and healthcare organizations across multiple countries.]]></description>
      <link>https://safeguard.sh/resources/blog/rhysida-ransomware-government-targeting</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rhysida-ransomware-government-targeting</guid>
      <pubDate>Mon, 05 Aug 2024 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[AI Supply Chain Attacks: Emerging Threats in Model and Data Pipelines]]></title>
      <description><![CDATA[As organizations adopt AI at scale, the AI/ML supply chain is becoming a new attack surface. From poisoned models to compromised training data, the threats are real and growing.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-supply-chain-attacks-emerging-threats</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-supply-chain-attacks-emerging-threats</guid>
      <pubDate>Mon, 05 Aug 2024 09:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard v2: The Platform Grows Up]]></title>
      <description><![CDATA[Safeguard v2 introduces container scanning, enhanced policy engine, team workspaces, and API v1.1 with webhook support. A major step toward enterprise readiness.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-v2-release-announcement</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-v2-release-announcement</guid>
      <pubDate>Thu, 01 Aug 2024 10:00:00 GMT</pubDate>
      <category>Release</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Cosign Verification Policies in Production]]></title>
      <description><![CDATA[Writing cosign verification policies that actually pass production deployment gates requires more precision than the examples suggest. Here is what we have learned.]]></description>
      <link>https://safeguard.sh/resources/blog/cosign-verification-policies-production</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cosign-verification-policies-production</guid>
      <pubDate>Tue, 30 Jul 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NuGet Private Feed Security Hardening]]></title>
      <description><![CDATA[Private NuGet feeds sit in the blind spot of most security programs. The hardening work is not glamorous but the failure modes are expensive.]]></description>
      <link>https://safeguard.sh/resources/blog/nuget-private-feed-security-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nuget-private-feed-security-hardening</guid>
      <pubDate>Tue, 30 Jul 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Rancher Cluster Security Hardening]]></title>
      <description><![CDATA[Rancher is the distribution that runs when your Kubernetes is neither EKS nor OpenShift. Hardening it well is specific work.]]></description>
      <link>https://safeguard.sh/resources/blog/rancher-cluster-security-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rancher-cluster-security-hardening</guid>
      <pubDate>Tue, 30 Jul 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[VMware ESXi Under Siege: Ransomware Campaigns Targeting Hypervisors in 2024]]></title>
      <description><![CDATA[Ransomware groups increasingly target VMware ESXi hypervisors to encrypt entire virtual environments at once. The 2024 campaigns exploited known and zero-day vulnerabilities for maximum impact.]]></description>
      <link>https://safeguard.sh/resources/blog/vmware-esxi-ransomware-campaigns-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vmware-esxi-ransomware-campaigns-2024</guid>
      <pubDate>Tue, 30 Jul 2024 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Azure Container Registry Trust Model]]></title>
      <description><![CDATA[What Azure Container Registry actually guarantees about the images you pull — signing, attestation, content trust, and where the trust chain breaks in practice.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-container-registry-trust-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-container-registry-trust-model</guid>
      <pubDate>Sun, 28 Jul 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Compromise Timeline Reconstruction]]></title>
      <description><![CDATA[How to rebuild a precise timeline after a dependency has been compromised, using lockfile history, registry metadata, and CI logs.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-compromise-timeline-reconstruction</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-compromise-timeline-reconstruction</guid>
      <pubDate>Sun, 28 Jul 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Monolith to Microservices: Supply Chain Changes]]></title>
      <description><![CDATA[What really happens to your software supply chain when you decompose a monolith into services, and how to avoid trading one risk for forty new ones.]]></description>
      <link>https://safeguard.sh/resources/blog/monolith-to-microservices-supply-chain-changes</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/monolith-to-microservices-supply-chain-changes</guid>
      <pubDate>Sun, 28 Jul 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CrowdStrike Falcon Global Outage: A Post-Mortem Deep Dive]]></title>
      <description><![CDATA[A technical reconstruction of the July 19 CrowdStrike Falcon sensor crash that grounded 8.5M Windows hosts, and what supply chain owners should change.]]></description>
      <link>https://safeguard.sh/resources/blog/crowdstrike-falcon-global-outage-deep-dive-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/crowdstrike-falcon-global-outage-deep-dive-2024</guid>
      <pubDate>Thu, 25 Jul 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Pydantic v2 Security Implications]]></title>
      <description><![CDATA[Pydantic v2 rewrote the core in Rust and changed validation semantics. Here is what that means for security-sensitive code, from input coercion to ReDoS exposure.]]></description>
      <link>https://safeguard.sh/resources/blog/pydantic-v2-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pydantic-v2-security-implications</guid>
      <pubDate>Thu, 25 Jul 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[US DoD Zero Trust: Software Dimensions]]></title>
      <description><![CDATA[Where the DoD Zero Trust Reference Architecture meets the software supply chain, and what program offices are actually doing about it.]]></description>
      <link>https://safeguard.sh/resources/blog/us-dod-zero-trust-software-dimensions</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/us-dod-zero-trust-software-dimensions</guid>
      <pubDate>Thu, 25 Jul 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AWS ECR Image Signing in Production]]></title>
      <description><![CDATA[Image signing in ECR has moved from nice-to-have to table stakes. Here is what it actually takes to run cosign and AWS Signer in production without breaking every deploy.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-ecr-image-signing-production</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-ecr-image-signing-production</guid>
      <pubDate>Mon, 22 Jul 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GDPR Meets CRA: Software Overlap]]></title>
      <description><![CDATA[GDPR Article 32 and the EU Cyber Resilience Act look like separate regimes, but for any software handling personal data they converge at the component level. Here's where they overlap and where they diverge.]]></description>
      <link>https://safeguard.sh/resources/blog/gdpr-meets-cra-software-overlap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gdpr-meets-cra-software-overlap</guid>
      <pubDate>Mon, 22 Jul 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How to Build a VEX Document for Your Consumers]]></title>
      <description><![CDATA[A hands-on tutorial for producing a CSAF-VEX document that tells your customers which CVEs actually affect your product and which do not.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-build-a-vex-document-for-consumers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-build-a-vex-document-for-consumers</guid>
      <pubDate>Mon, 22 Jul 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Scattered Spider: Developer Targeting Patterns]]></title>
      <description><![CDATA[The English-speaking social engineering crew behind MGM and Caesars keeps going after developers and help desks. Here's what I keep seeing.]]></description>
      <link>https://safeguard.sh/resources/blog/scattered-spider-developer-targeting-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/scattered-spider-developer-targeting-patterns</guid>
      <pubDate>Mon, 22 Jul 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SentinelOne Supply Chain Detection Logic for Build Systems]]></title>
      <description><![CDATA[How to extend SentinelOne's behavioral detection engine to cover build agents, package registries, and developer endpoints without drowning analysts in false positives.]]></description>
      <link>https://safeguard.sh/resources/blog/sentinel-one-supply-chain-detection-logic</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sentinel-one-supply-chain-detection-logic</guid>
      <pubDate>Mon, 22 Jul 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Lessons from CrowdStrike: Rethinking How We Deploy Software Updates]]></title>
      <description><![CDATA[The CrowdStrike outage wasn't just an EDR problem. It exposed fundamental weaknesses in how the entire industry handles software updates, from kernel drivers to SaaS platforms.]]></description>
      <link>https://safeguard.sh/resources/blog/crowdstrike-outage-lessons-software-updates</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/crowdstrike-outage-lessons-software-updates</guid>
      <pubDate>Mon, 22 Jul 2024 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GraalVM Native Image Supply Chain]]></title>
      <description><![CDATA[GraalVM native images change the supply chain story in ways that most SBOM tooling has not caught up with yet. Here is what gets baked in, what gets stripped out, and what still needs to be tracked.]]></description>
      <link>https://safeguard.sh/resources/blog/graalvm-native-image-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/graalvm-native-image-supply-chain</guid>
      <pubDate>Sat, 20 Jul 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CrowdStrike Falcon Update Triggers Global IT Outage: What Happened]]></title>
      <description><![CDATA[On July 19, 2024, a faulty CrowdStrike Falcon sensor update caused 8.5 million Windows machines to blue-screen worldwide, grounding flights, halting hospitals, and exposing the fragility of centralized security infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/crowdstrike-falcon-global-outage-july-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/crowdstrike-falcon-global-outage-july-2024</guid>
      <pubDate>Fri, 19 Jul 2024 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Dropbox 2022: The Supply Chain Angle]]></title>
      <description><![CDATA[Dropbox's 2022 GitHub phishing incident began with a developer-targeted CircleCI lookalike campaign; the supply chain lessons centered on CI tokens and code.]]></description>
      <link>https://safeguard.sh/resources/blog/dropbox-incident-2022-supply-chain-angle</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dropbox-incident-2022-supply-chain-angle</guid>
      <pubDate>Thu, 18 Jul 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[External Secrets Operator: A Kubernetes Guide]]></title>
      <description><![CDATA[A senior engineer's walkthrough of External Secrets Operator, covering architecture, SecretStore design, rotation, and the patterns that hold up in production.]]></description>
      <link>https://safeguard.sh/resources/blog/external-secrets-operator-kubernetes-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/external-secrets-operator-kubernetes-guide</guid>
      <pubDate>Thu, 18 Jul 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[npm Token Rotation: An Enterprise Strategy]]></title>
      <description><![CDATA[Rotating a few npm tokens is easy. Rotating a few thousand across a shared CI fleet is a project. A practical strategy that survives real organizations.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-token-rotation-enterprise-strategy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-token-rotation-enterprise-strategy</guid>
      <pubDate>Thu, 18 Jul 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Open Banking API Supply Chain Security]]></title>
      <description><![CDATA[Open banking depends on a tangle of SDKs, certificate authorities, and directory services. What PSD2, the UK's Open Banking Standard, and the emerging US framework mean for supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/open-banking-api-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-banking-api-supply-chain-security</guid>
      <pubDate>Thu, 18 Jul 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Drone CI Security Considerations]]></title>
      <description><![CDATA[A security-focused look at Drone CI: runner isolation, secret handling, plugin risks, and the differences between Drone OSS, Enterprise, and the Harness transition.]]></description>
      <link>https://safeguard.sh/resources/blog/drone-ci-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/drone-ci-security-considerations</guid>
      <pubDate>Mon, 15 Jul 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Fuzzing Open Source for Supply Chain Findings]]></title>
      <description><![CDATA[How modern coverage-guided fuzzing finds real vulnerabilities in open-source dependencies, and how to fold it into a supply-chain security program.]]></description>
      <link>https://safeguard.sh/resources/blog/fuzzing-open-source-for-supply-chain-findings</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fuzzing-open-source-for-supply-chain-findings</guid>
      <pubDate>Mon, 15 Jul 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Auto-Fix: Automated Vulnerability Remediation That Respects Your Codebase]]></title>
      <description><![CDATA[Auto-Fix generates pull requests that update vulnerable dependencies with compatibility checks, test validation, and rollback safety. Remediation at the speed of disclosure.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-auto-fix-automated-remediation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-auto-fix-automated-remediation</guid>
      <pubDate>Mon, 15 Jul 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[rust crates.io Security Model Reviewed]]></title>
      <description><![CDATA[A look at how crates.io handles authentication, yanking, namespace squatting, and the supply chain risks that remain in mid-2024.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-crates-io-security-model-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-crates-io-security-model-review</guid>
      <pubDate>Sun, 14 Jul 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GCP Workload Identity Federation: Supply Chain Uses]]></title>
      <description><![CDATA[How to use GCP Workload Identity Federation to eliminate long-lived service account keys from your supply chain: GitHub Actions, GitLab CI, external builders, and the misconfigurations that silently undermine the design.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-workload-identity-federation-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-workload-identity-federation-supply-chain</guid>
      <pubDate>Fri, 12 Jul 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Nix Reproducible Builds: A Supply Chain Case]]></title>
      <description><![CDATA[Practical supply chain lessons from running Nix and Nix flakes in production, including flake.lock handling, content-addressed derivations, and cachix trust.]]></description>
      <link>https://safeguard.sh/resources/blog/nix-reproducible-builds-supply-chain-case</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nix-reproducible-builds-supply-chain-case</guid>
      <pubDate>Fri, 12 Jul 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Mean Time to Remediation Benchmarks: How Fast Should You Be Patching?]]></title>
      <description><![CDATA[MTTR is the most important vulnerability management metric. But what is a good MTTR? Industry benchmarks, realistic targets, and strategies for improvement.]]></description>
      <link>https://safeguard.sh/resources/blog/mean-time-to-remediation-benchmarks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mean-time-to-remediation-benchmarks</guid>
      <pubDate>Fri, 12 Jul 2024 00:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[ServiceNow CVE-2024-4879: Remote Code Execution via Jelly Template Injection]]></title>
      <description><![CDATA[Critical RCE vulnerabilities in ServiceNow were chained together for unauthenticated access, with active exploitation observed within days of disclosure.]]></description>
      <link>https://safeguard.sh/resources/blog/servicenow-cve-2024-4879-rce-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/servicenow-cve-2024-4879-rce-exploitation</guid>
      <pubDate>Wed, 10 Jul 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Securing ML Model Serving Infrastructure]]></title>
      <description><![CDATA[Model serving infrastructure is a growing attack surface that most security teams overlook. From model poisoning to inference API abuse, here are the risks and how to address them.]]></description>
      <link>https://safeguard.sh/resources/blog/ml-model-serving-infrastructure-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ml-model-serving-infrastructure-security</guid>
      <pubDate>Wed, 10 Jul 2024 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Maintainer Burnout: Security Implications]]></title>
      <description><![CDATA[Exhausted maintainers are not just a welfare problem. They are a security problem. Burnout is a precondition for social engineering, delayed patches, and hostile takeovers.]]></description>
      <link>https://safeguard.sh/resources/blog/maintainer-burnout-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maintainer-burnout-security-implications</guid>
      <pubDate>Mon, 08 Jul 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Semgrep vs CodeQL: SAST Comparison]]></title>
      <description><![CDATA[Compare Semgrep and CodeQL on rule authoring, language coverage, taint analysis, scan time, IDE integration, and pricing to choose the right SAST engine in 2024.]]></description>
      <link>https://safeguard.sh/resources/blog/semgrep-vs-codeql-sast-comparison-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/semgrep-vs-codeql-sast-comparison-2024</guid>
      <pubDate>Mon, 08 Jul 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Code Repository Security Hardening]]></title>
      <description><![CDATA[Your source code repository is the starting point of your entire supply chain. Hardening it against unauthorized access, code injection, and configuration tampering is non-negotiable.]]></description>
      <link>https://safeguard.sh/resources/blog/code-repository-security-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/code-repository-security-hardening</guid>
      <pubDate>Mon, 08 Jul 2024 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FastAPI Supply Chain Security: A Working Guide]]></title>
      <description><![CDATA[FastAPI's dependency surface is deceptively large. Here is how to lock it down in practice, covering Starlette, Pydantic, Uvicorn, and the plugins you likely missed.]]></description>
      <link>https://safeguard.sh/resources/blog/fastapi-supply-chain-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fastapi-supply-chain-security-guide</guid>
      <pubDate>Fri, 05 Jul 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Go Checksum Verification Patterns]]></title>
      <description><![CDATA[go.sum and the Go checksum database are among the most rigorous integrity mechanisms in any language ecosystem, and the verification patterns around them deserve to be understood and used well.]]></description>
      <link>https://safeguard.sh/resources/blog/go-checksum-verification-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-checksum-verification-patterns</guid>
      <pubDate>Fri, 05 Jul 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[bundler-audit Production Setup]]></title>
      <description><![CDATA[A practical guide to running bundler-audit in production CI pipelines, including advisory database updates, exception handling, and integration with remediation workflows.]]></description>
      <link>https://safeguard.sh/resources/blog/bundler-audit-production-setup</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bundler-audit-production-setup</guid>
      <pubDate>Tue, 02 Jul 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard SCA: Vulnerability Scanning Built for the Supply Chain]]></title>
      <description><![CDATA[Safeguard SCA goes beyond basic CVE matching with multi-source intelligence, version-range precision, and exploitability context that cuts through vulnerability noise.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-sca-vulnerability-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-sca-vulnerability-scanning</guid>
      <pubDate>Mon, 01 Jul 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[regreSSHion: CVE-2024-6387 OpenSSH Remote Code Execution]]></title>
      <description><![CDATA[A regression in OpenSSH's signal handler reintroduced a vulnerability from 2006, enabling unauthenticated remote code execution on glibc-based Linux systems. Here's what you need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/regresshion-openssh-cve-2024-6387</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/regresshion-openssh-cve-2024-6387</guid>
      <pubDate>Mon, 01 Jul 2024 08:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Azure Policy for Supply Chain Enforcement]]></title>
      <description><![CDATA[Azure Policy is the enforcement layer most Azure platforms underuse. A concrete, policy-by-policy guide to wiring it into supply chain controls that actually stick.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-policy-supply-chain-enforcement</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-policy-supply-chain-enforcement</guid>
      <pubDate>Sun, 30 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Retail POS Supply Chain Security]]></title>
      <description><![CDATA[Practical controls and standards shaping point-of-sale software supply chains, from PCI DSS 4.0 to PA-DSS successors and retailer-specific frameworks.]]></description>
      <link>https://safeguard.sh/resources/blog/retail-pos-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/retail-pos-supply-chain-security</guid>
      <pubDate>Sun, 30 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AWS Secrets Manager vs Parameter Store]]></title>
      <description><![CDATA[Two AWS services, overlapping features, and a pricing difference that adds up to real money. The decision framework for Secrets Manager vs Parameter Store, based on what actually goes wrong in production.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-secrets-manager-vs-parameter-store-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-secrets-manager-vs-parameter-store-comparison</guid>
      <pubDate>Fri, 28 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Firecracker micro-VM Security Model]]></title>
      <description><![CDATA[AWS built Firecracker to run Lambda. The security model is the entire value proposition, and it holds up under scrutiny.]]></description>
      <link>https://safeguard.sh/resources/blog/firecracker-micro-vm-security-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/firecracker-micro-vm-security-model</guid>
      <pubDate>Fri, 28 Jun 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[in-toto Attestation Formats Reviewed]]></title>
      <description><![CDATA[The in-toto attestation framework is the plumbing under SLSA, Sigstore, and most supply chain tooling. Here is a practical review of the v1 formats and their edges.]]></description>
      <link>https://safeguard.sh/resources/blog/in-toto-attestation-formats-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/in-toto-attestation-formats-review</guid>
      <pubDate>Fri, 28 Jun 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[ArgoCD GitOps Security Depth]]></title>
      <description><![CDATA[A deep look at ArgoCD security in production: RBAC models, repo credentials, ApplicationSet risks, and the CVEs that have shaped the current hardening defaults.]]></description>
      <link>https://safeguard.sh/resources/blog/argocd-gitops-security-depth</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/argocd-gitops-security-depth</guid>
      <pubDate>Tue, 25 Jun 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Commercial OSS License Shifts: An Analysis]]></title>
      <description><![CDATA[From MongoDB to HashiCorp, commercial open source vendors have repeatedly relicensed away from OSI-approved licenses. The pattern reveals a fundamental tension between sustainability and freedom.]]></description>
      <link>https://safeguard.sh/resources/blog/commercial-open-source-license-shift-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/commercial-open-source-license-shift-analysis</guid>
      <pubDate>Tue, 25 Jun 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[ISO 27001 Meets NIST CSF: Integration]]></title>
      <description><![CDATA[Running an ISMS under ISO 27001:2022 while executives want NIST CSF 2.0 reporting? These frameworks integrate cleanly if you map Annex A controls to CSF subcategories once and stop duplicating work.]]></description>
      <link>https://safeguard.sh/resources/blog/iso-27001-meets-nist-csf-integration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/iso-27001-meets-nist-csf-integration</guid>
      <pubDate>Tue, 25 Jun 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Microsoft Midnight Blizzard: Detailed Timeline]]></title>
      <description><![CDATA[A reconstructed public timeline of Microsoft's Midnight Blizzard intrusion, from the initial password spray in November 2023 through the source code and federal agency disclosures.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-midnight-blizzard-detailed-timeline</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-midnight-blizzard-detailed-timeline</guid>
      <pubDate>Tue, 25 Jun 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Polyfill.io Supply Chain Attack: When a CDN Domain Changes Hands]]></title>
      <description><![CDATA[A Chinese company acquired the polyfill.io domain and began injecting malicious code into websites that relied on the CDN, affecting over 100,000 sites. The attack exploited trust in third-party JavaScript.]]></description>
      <link>https://safeguard.sh/resources/blog/polyfill-io-supply-chain-attack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/polyfill-io-supply-chain-attack</guid>
      <pubDate>Tue, 25 Jun 2024 09:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[GN and Meson Build Systems: Security]]></title>
      <description><![CDATA[A side-by-side security comparison of GN (Chromium) and Meson, covering declarative posture, wrap files, toolchain handling, and supply chain behavior.]]></description>
      <link>https://safeguard.sh/resources/blog/gn-meson-build-system-security-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gn-meson-build-system-security-comparison</guid>
      <pubDate>Sat, 22 Jun 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[NuGet Central Package Management Security]]></title>
      <description><![CDATA[Central Package Management pulled NuGet's multi-project version chaos into a single source of truth. The security implications run deeper than the ergonomics suggest.]]></description>
      <link>https://safeguard.sh/resources/blog/nuget-central-package-management-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nuget-central-package-management-security</guid>
      <pubDate>Sat, 22 Jun 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI API Token Scopes: An Audit Guide]]></title>
      <description><![CDATA[PyPI API tokens look simple, but how you scope them decides whether a leaked CI secret is a bad day or an ecosystem event. A practical audit guide for security teams.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-api-token-scopes-audit</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-api-token-scopes-audit</guid>
      <pubDate>Sat, 22 Jun 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Malicious Package Quarantine Procedures]]></title>
      <description><![CDATA[How to quarantine a malicious package across your registries, caches, and running systems without breaking every developer's workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/malicious-package-quarantine-procedures</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/malicious-package-quarantine-procedures</guid>
      <pubDate>Thu, 20 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Migrating From Ansible to GitOps: A Supply Chain Perspective]]></title>
      <description><![CDATA[Move from Ansible to GitOps with supply chain security intact. Pattern-by-pattern migration, trust boundary changes, and pitfalls to avoid in the transition.]]></description>
      <link>https://safeguard.sh/resources/blog/migrating-off-ansible-to-gitops</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/migrating-off-ansible-to-gitops</guid>
      <pubDate>Thu, 20 Jun 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[npm Package Takeover: The Summer 2024 Wave]]></title>
      <description><![CDATA[Between May and June 2024 at least 36 npm packages were hijacked via expired maintainer domains and leaked tokens. We map the cluster.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-package-takeover-summer-2024-wave</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-package-takeover-summer-2024-wave</guid>
      <pubDate>Thu, 20 Jun 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Management at Enterprise Scale: What Actually Works]]></title>
      <description><![CDATA[Managing vulnerabilities across thousands of applications and millions of dependencies requires fundamentally different approaches than what works for a single team. Here is what scales.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-management-at-scale-enterprise</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-management-at-scale-enterprise</guid>
      <pubDate>Thu, 20 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[The Middle East Cybersecurity Landscape: Rapid Digitization Meets Rising Threats]]></title>
      <description><![CDATA[The Middle East is investing heavily in digital transformation, but the cybersecurity infrastructure is not keeping pace. A look at the threat landscape, regulatory evolution, and supply chain risks across the region.]]></description>
      <link>https://safeguard.sh/resources/blog/middle-east-cybersecurity-landscape-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/middle-east-cybersecurity-landscape-2024</guid>
      <pubDate>Thu, 20 Jun 2024 00:00:00 GMT</pubDate>
      <category>Regional Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Go Module Hijacking Detection]]></title>
      <description><![CDATA[Module hijacking in Go is rare compared to npm, but it does happen, and the patterns worth watching are different from what you might expect from other ecosystems.]]></description>
      <link>https://safeguard.sh/resources/blog/go-module-hijacking-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-module-hijacking-detection</guid>
      <pubDate>Tue, 18 Jun 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Payment Processor Dependency Risks]]></title>
      <description><![CDATA[The libraries and services that sit between a merchant and the card networks carry concentrated risk. A practical look at what goes wrong, and how to build a dependency program that catches it.]]></description>
      <link>https://safeguard.sh/resources/blog/payment-processor-dependency-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/payment-processor-dependency-risks</guid>
      <pubDate>Tue, 18 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AWS CodePipeline Hardening Patterns]]></title>
      <description><![CDATA[CodePipeline is the glue between your source, build, and deploy. It is also the thing that gets the widest IAM role in most AWS accounts. Here is how to harden it without rewriting your pipelines.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-codepipeline-hardening-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-codepipeline-hardening-patterns</guid>
      <pubDate>Sat, 15 Jun 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Clop: Supply Chain Exploitation Tradecraft]]></title>
      <description><![CDATA[Clop has turned supply chain exploitation into a repeatable playbook — MOVEit, GoAnywhere, Cleo. A look at the tradecraft that makes the campaign work.]]></description>
      <link>https://safeguard.sh/resources/blog/clop-supply-chain-exploitation-tradecraft</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/clop-supply-chain-exploitation-tradecraft</guid>
      <pubDate>Sat, 15 Jun 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[DevEx Meets DevSecOps: Why Developer Experience Determines Security Outcomes]]></title>
      <description><![CDATA[Security tools that developers hate get bypassed. The organizations with the best security outcomes are the ones that treat developer experience as a security requirement.]]></description>
      <link>https://safeguard.sh/resources/blog/devex-meets-devsecops-developer-experience</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/devex-meets-devsecops-developer-experience</guid>
      <pubDate>Sat, 15 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard IDE Extension: Supply Chain Intelligence in Your Editor]]></title>
      <description><![CDATA[The Safeguard VS Code extension surfaces vulnerability data, dependency health, and policy violations directly in your editor as you write code.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-ide-extension-launch</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-ide-extension-launch</guid>
      <pubDate>Sat, 15 Jun 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Elastic Security Supply Chain Signals]]></title>
      <description><![CDATA[How to surface software supply chain threats in Elastic Security using EQL, detection rules, and the Elastic Common Schema for build pipeline and registry events.]]></description>
      <link>https://safeguard.sh/resources/blog/elastic-security-supply-chain-signals</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/elastic-security-supply-chain-signals</guid>
      <pubDate>Sat, 15 Jun 2024 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Bundler Lockfile Security Practices]]></title>
      <description><![CDATA[How to use Gemfile.lock as a real security artifact: checksums, frozen mode, reproducible resolves, and what changed in Bundler 2.5's expanded lockfile format.]]></description>
      <link>https://safeguard.sh/resources/blog/bundler-lockfile-security-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bundler-lockfile-security-practices</guid>
      <pubDate>Fri, 14 Jun 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[npm Workspaces Security Considerations]]></title>
      <description><![CDATA[Workspaces are fantastic for developer experience and hostile to naive security tooling. Here is what actually changes when you flip them on.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-workspaces-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-workspaces-security-considerations</guid>
      <pubDate>Wed, 12 Jun 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Gramm-Leach-Bliley Software Security Update]]></title>
      <description><![CDATA[The FTC Safeguards Rule amendments effective May 13, 2024 expand breach-notification and software supply chain expectations for financial institutions under GLBA.]]></description>
      <link>https://safeguard.sh/resources/blog/gramm-leach-bliley-software-security-update-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gramm-leach-bliley-software-security-update-2024</guid>
      <pubDate>Tue, 11 Jun 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Gradle Build Cache Security Hardening]]></title>
      <description><![CDATA[The Gradle build cache is a performance feature with supply chain consequences. Here is how to configure it so cache poisoning, stale outputs, and cross-project contamination do not become your next incident.]]></description>
      <link>https://safeguard.sh/resources/blog/gradle-build-cache-security-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gradle-build-cache-security-hardening</guid>
      <pubDate>Mon, 10 Jun 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How to Sign Container Images With Cosign: A Complete Guide]]></title>
      <description><![CDATA[A practical walkthrough for signing container images with Cosign using keyless OIDC, verifying signatures, and enforcing policy in your Kubernetes cluster.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-sign-container-images-with-cosign-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-sign-container-images-with-cosign-guide</guid>
      <pubDate>Mon, 10 Jun 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Snowflake Customer Data Breaches: 165 Organizations Hit by Credential Theft Campaign]]></title>
      <description><![CDATA[Attackers used stolen credentials from infostealer malware to access Snowflake customer accounts without MFA, compromising data at Ticketmaster, Santander, AT&T, and over 160 other organizations.]]></description>
      <link>https://safeguard.sh/resources/blog/snowflake-customer-data-breaches</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/snowflake-customer-data-breaches</guid>
      <pubDate>Mon, 10 Jun 2024 09:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GCP Secret Manager Rotation Strategy]]></title>
      <description><![CDATA[A workable rotation strategy for GCP Secret Manager: how to structure secret versions, schedule rotation, coordinate consumers, and avoid the outage patterns that scare teams off rotation in the first place.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-secret-manager-rotation-strategy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-secret-manager-rotation-strategy</guid>
      <pubDate>Sat, 08 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Rust Edition Migration Security Notes]]></title>
      <description><![CDATA[Field notes from migrating a production workspace from Rust 2018 to 2021, and what to watch for when 2024 lands in edition transitions.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-edition-migration-security-notes</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-edition-migration-security-notes</guid>
      <pubDate>Sat, 08 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Security Team Scaling Strategies: Growing Without Burning Out]]></title>
      <description><![CDATA[Your security team is probably understaffed. Here is how to scale security coverage without proportionally scaling headcount.]]></description>
      <link>https://safeguard.sh/resources/blog/security-team-scaling-strategies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-team-scaling-strategies</guid>
      <pubDate>Sat, 08 Jun 2024 10:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Tauri Desktop App Security Model: What Developers Need to Know]]></title>
      <description><![CDATA[Tauri offers a fundamentally different security model than Electron for desktop applications. Understanding its permission system, IPC boundaries, and supply chain implications is critical.]]></description>
      <link>https://safeguard.sh/resources/blog/tauri-desktop-app-security-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/tauri-desktop-app-security-model</guid>
      <pubDate>Wed, 05 Jun 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[OpenAI Internal Breach: What the 2023 Forum Hack Reveals About AI Company Security]]></title>
      <description><![CDATA[Reports emerged that a hacker accessed OpenAI's internal messaging systems in early 2023, raising questions about AI company security practices and the risks of concentrated AI development.]]></description>
      <link>https://safeguard.sh/resources/blog/openai-internal-breach-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openai-internal-breach-2024</guid>
      <pubDate>Wed, 05 Jun 2024 09:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Next.js Supply Chain Security Hardening]]></title>
      <description><![CDATA[Next.js pulls hundreds of transitive dependencies into production bundles, and the middleware auth bypass of March 2025 showed how a single framework CVE cascades across every App Router deployment. Here is the hardening playbook for 2024 and beyond.]]></description>
      <link>https://safeguard.sh/resources/blog/nextjs-supply-chain-security-hardening-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nextjs-supply-chain-security-hardening-2024</guid>
      <pubDate>Tue, 04 Jun 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard CLI: Supply Chain Security Without Leaving Your Terminal]]></title>
      <description><![CDATA[The Safeguard CLI brings SBOM generation, vulnerability scanning, policy checks, and supply chain queries directly into your development workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-cli-tool-developer-workflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-cli-tool-developer-workflow</guid>
      <pubDate>Sat, 01 Jun 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Infisical: An Open-Source Secrets Platform Review]]></title>
      <description><![CDATA[A senior engineer's assessment of Infisical as a self-hostable secrets platform, covering architecture, operational posture, and where it fits in 2024.]]></description>
      <link>https://safeguard.sh/resources/blog/infisical-open-source-secrets-platform</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/infisical-open-source-secrets-platform</guid>
      <pubDate>Thu, 30 May 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Insurance Industry Software Supply Chain]]></title>
      <description><![CDATA[Insurers underwrite cyber risk while running on the same fragile dependency graphs as everyone else. A look at the industry's software supply chain blind spots.]]></description>
      <link>https://safeguard.sh/resources/blog/insurance-industry-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/insurance-industry-software-supply-chain</guid>
      <pubDate>Thu, 30 May 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Vite Build Tool Security Considerations]]></title>
      <description><![CDATA[Vite has become the default build tool for a generation of JavaScript frameworks. Its plugin model, dev server, and dependency pre-bundling each carry distinct security implications worth understanding.]]></description>
      <link>https://safeguard.sh/resources/blog/vite-build-tool-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vite-build-tool-security-considerations</guid>
      <pubDate>Thu, 30 May 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Harness.io Supply Chain Security Reviewed]]></title>
      <description><![CDATA[A security review of the Harness.io platform covering SSCA, CI/CD governance, STO integration, and the practical configuration required to get a production-grade supply chain posture.]]></description>
      <link>https://safeguard.sh/resources/blog/harness-io-supply-chain-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/harness-io-supply-chain-security-review</guid>
      <pubDate>Tue, 28 May 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Maven Central Changes in 2024 and Their Security Impact]]></title>
      <description><![CDATA[Sonatype made several Maven Central changes in 2024 that materially affected the Java supply chain. A rundown of what changed, who was affected, and what Java teams should do.]]></description>
      <link>https://safeguard.sh/resources/blog/maven-central-changes-2024-security-impact</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maven-central-changes-2024-security-impact</guid>
      <pubDate>Tue, 28 May 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Rails Application Template Security]]></title>
      <description><![CDATA[Rails application templates are powerful and dangerous: how they execute, what they can touch, and how to use them safely for new-project scaffolding.]]></description>
      <link>https://safeguard.sh/resources/blog/rails-application-template-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rails-application-template-security</guid>
      <pubDate>Tue, 28 May 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Symbolic Execution for Dependency Analysis]]></title>
      <description><![CDATA[Symbolic execution explores program paths without concrete inputs. For supply-chain work, it answers reachability questions that fuzzing cannot.]]></description>
      <link>https://safeguard.sh/resources/blog/symbolic-execution-for-dependency-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/symbolic-execution-for-dependency-analysis</guid>
      <pubDate>Tue, 28 May 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Check Point VPN Zero-Day CVE-2024-24919: Information Disclosure Under Active Exploitation]]></title>
      <description><![CDATA[A critical information disclosure vulnerability in Check Point VPN products allowed attackers to read sensitive files including password hashes, enabling lateral movement into enterprise networks.]]></description>
      <link>https://safeguard.sh/resources/blog/check-point-vpn-cve-2024-24919-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/check-point-vpn-cve-2024-24919-zero-day</guid>
      <pubDate>Tue, 28 May 2024 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Cisco Duo Incident: Supply Chain Depth]]></title>
      <description><![CDATA[Cisco Duo's 2024 disclosure about a telephony provider breach exposed SMS and voice MFA logs; the supply chain depth of authentication vendors is the story.]]></description>
      <link>https://safeguard.sh/resources/blog/cisco-duo-incident-supply-chain-depth</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisco-duo-incident-supply-chain-depth</guid>
      <pubDate>Sat, 25 May 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GCP Cloud Build Hardening in Production]]></title>
      <description><![CDATA[Lessons from hardening Cloud Build pipelines in production environments: private pools, least-privilege service accounts, provenance, and the controls that actually stop lateral movement.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-cloud-build-hardening-production</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-cloud-build-hardening-production</guid>
      <pubDate>Sat, 25 May 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[OSS Contributor License Agreements Reviewed]]></title>
      <description><![CDATA[CLAs, DCOs, and the subtle differences between Apache ICLAs, Google corporate CLAs, and Eclipse ECAs shape what contributors give up and what projects can do.]]></description>
      <link>https://safeguard.sh/resources/blog/oss-contributor-license-agreements-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/oss-contributor-license-agreements-review</guid>
      <pubDate>Sat, 25 May 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Message Queue Security: Hardening Kafka, RabbitMQ, and Event Brokers]]></title>
      <description><![CDATA[Message queues are the nervous system of modern architectures. A compromised broker can intercept, modify, or inject messages across your entire system. Here is how to lock them down.]]></description>
      <link>https://safeguard.sh/resources/blog/message-queue-security-kafka-rabbitmq</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/message-queue-security-kafka-rabbitmq</guid>
      <pubDate>Sat, 25 May 2024 00:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Go Workspaces Supply Chain Risks]]></title>
      <description><![CDATA[Go workspaces make multi-module development feel natural, but the go.work file introduces a new trust boundary that can quietly override pinned versions and bypass checksum verification.]]></description>
      <link>https://safeguard.sh/resources/blog/go-workspaces-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-workspaces-supply-chain-risks</guid>
      <pubDate>Wed, 22 May 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Package Yanking Policies Analyzed]]></title>
      <description><![CDATA[Yanking is PyPI's narrow, deliberately blunt tool for dealing with broken releases. A close analysis of what it does, what it doesn't do, and when to use it instead of a delete.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-package-yanking-policies-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-package-yanking-policies-analysis</guid>
      <pubDate>Wed, 22 May 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Sumo Logic for Supply Chain Observability: A Practitioner's Guide]]></title>
      <description><![CDATA[Architect Sumo Logic dashboards, queries, and anomaly detection for software supply chain visibility across SCM, CI/CD, registries, and cloud runtime.]]></description>
      <link>https://safeguard.sh/resources/blog/sumo-logic-supply-chain-observability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sumo-logic-supply-chain-observability</guid>
      <pubDate>Wed, 22 May 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FastAPI Security Best Practices]]></title>
      <description><![CDATA[Securing FastAPI applications with Pydantic validation, OAuth2 integration, and dependency injection patterns.]]></description>
      <link>https://safeguard.sh/resources/blog/fastapi-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fastapi-security-best-practices</guid>
      <pubDate>Wed, 22 May 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[How to Measure Dependency Freshness in CI]]></title>
      <description><![CDATA[A practical CI tutorial for measuring dependency freshness, setting SLOs for version drift, and failing builds when packages fall too far behind upstream.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-measure-dependency-freshness-in-ci</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-measure-dependency-freshness-in-ci</guid>
      <pubDate>Mon, 20 May 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SOX IT Controls Meet Software Controls]]></title>
      <description><![CDATA[Sarbanes-Oxley IT general controls predate modern software delivery. Here's how change management, access, and segregation of duties controls actually look when applied to CI/CD pipelines and software components.]]></description>
      <link>https://safeguard.sh/resources/blog/sox-it-controls-meets-software-controls</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sox-it-controls-meets-software-controls</guid>
      <pubDate>Mon, 20 May 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Utilities Sector NERC CIP Software Supply Chain]]></title>
      <description><![CDATA[NERC CIP-013 turned software supply chain into a regulated obligation for the bulk electric system. A practical look at what utilities are actually doing.]]></description>
      <link>https://safeguard.sh/resources/blog/utilities-sector-nerc-cip-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/utilities-sector-nerc-cip-software-supply-chain</guid>
      <pubDate>Mon, 20 May 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Deepfakes and Social Engineering: The Human Layer of Supply Chain Attacks]]></title>
      <description><![CDATA[AI-generated deepfakes are making social engineering attacks against software supply chains more convincing and harder to detect.]]></description>
      <link>https://safeguard.sh/resources/blog/deepfake-social-engineering-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/deepfake-social-engineering-supply-chain</guid>
      <pubDate>Mon, 20 May 2024 11:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Visualization Tools Compared: Making Dependency Data Actionable]]></title>
      <description><![CDATA[An SBOM in JSON or XML format is data. A visualization turns that data into insight. This comparison examines how different tools present SBOM data and which approaches work best for different audiences.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-visualization-tools-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-visualization-tools-comparison</guid>
      <pubDate>Mon, 20 May 2024 10:00:00 GMT</pubDate>
      <category>SBOM and Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Enterprise Server CVE-2024-4985: SAML Authentication Bypass]]></title>
      <description><![CDATA[A critical authentication bypass in GitHub Enterprise Server allowed attackers to forge SAML responses and gain administrator access to self-hosted GitHub instances without any credentials.]]></description>
      <link>https://safeguard.sh/resources/blog/github-enterprise-server-cve-2024-4985</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-enterprise-server-cve-2024-4985</guid>
      <pubDate>Mon, 20 May 2024 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Azure Key Vault Rotation Patterns]]></title>
      <description><![CDATA[Rotation is the Key Vault feature most teams nominally have and few actually operate. A walk through the patterns that work for secrets, keys, and certificates at scale.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-key-vault-rotation-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-key-vault-rotation-patterns</guid>
      <pubDate>Sat, 18 May 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[.NET Supply Chain Audit Patterns]]></title>
      <description><![CDATA[Auditing a .NET supply chain is a different exercise than auditing a JavaScript one, and the patterns that actually find problems are specific to how the ecosystem works.]]></description>
      <link>https://safeguard.sh/resources/blog/dotnet-supply-chain-audit-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dotnet-supply-chain-audit-patterns</guid>
      <pubDate>Sat, 18 May 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Migrating SBOM Tooling Providers]]></title>
      <description><![CDATA[A practical field guide to switching SBOM tooling vendors without losing historical data, breaking compliance reports, or annoying the auditors.]]></description>
      <link>https://safeguard.sh/resources/blog/migrating-sbom-tooling-provider-migration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/migrating-sbom-tooling-provider-migration</guid>
      <pubDate>Sat, 18 May 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Pants Build Tool Security Posture]]></title>
      <description><![CDATA[A practitioner's view of the Pants build system's security properties, covering sandboxing, third-party resolution, and the Pants 2.x architecture.]]></description>
      <link>https://safeguard.sh/resources/blog/pants-build-tool-security-posture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pants-build-tool-security-posture</guid>
      <pubDate>Sat, 18 May 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Managing Python Package Namespace Conflicts]]></title>
      <description><![CDATA[Python's flat namespace creates real security problems. Here is how namespace packages, shadowing, and install order interact, and how to avoid the surprises.]]></description>
      <link>https://safeguard.sh/resources/blog/python-package-namespace-conflicts-management</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-package-namespace-conflicts-management</guid>
      <pubDate>Sat, 18 May 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Rust no_std Supply Chain Considerations]]></title>
      <description><![CDATA[Writing Rust for embedded or kernel targets drops you into no_std territory, and the supply chain rules are different there. A practical look at what changes and why.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-no-std-supply-chain-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-no-std-supply-chain-considerations</guid>
      <pubDate>Wed, 15 May 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SLSA for Go Releases: A Practical Guide]]></title>
      <description><![CDATA[Go's build model makes SLSA provenance more tractable than most ecosystems. Here is the practical guide for producing and verifying provenance on Go releases.]]></description>
      <link>https://safeguard.sh/resources/blog/slsa-for-go-releases-practical-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/slsa-for-go-releases-practical-guide</guid>
      <pubDate>Wed, 15 May 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Griffin AI: Your Autonomous Supply Chain Security Analyst]]></title>
      <description><![CDATA[Griffin is Safeguard's AI assistant that answers natural-language questions about your software supply chain, correlates threats in real time, and recommends actions.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-griffin-ai-autonomous-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-griffin-ai-autonomous-security</guid>
      <pubDate>Wed, 15 May 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[SBOM for EdTech Platforms: Protecting Student Data Through Supply Chain Transparency]]></title>
      <description><![CDATA[EdTech platforms handle some of the most sensitive data — children's information. FERPA, COPPA, and state student privacy laws demand supply chain visibility that most EdTech companies lack.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-edtech-platforms</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-edtech-platforms</guid>
      <pubDate>Wed, 15 May 2024 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[The OSS Pledge: Adoption Tracking at Six Months]]></title>
      <description><![CDATA[Six months after the OSS Pledge launch, adoption is climbing but uneven. Who signed, who followed through with funding, and what the pledge has actually shifted in open-source economics.]]></description>
      <link>https://safeguard.sh/resources/blog/oss-pledge-adoption-tracking-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/oss-pledge-adoption-tracking-2024</guid>
      <pubDate>Tue, 14 May 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[containerd Security Configuration Guide]]></title>
      <description><![CDATA[containerd runs most of Kubernetes today. Its defaults are reasonable, but reasonable is not hardened. Here is how to close the gaps.]]></description>
      <link>https://safeguard.sh/resources/blog/containerd-security-configuration-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/containerd-security-configuration-guide</guid>
      <pubDate>Sun, 12 May 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Kotlin Multiplatform Supply Chain Risks]]></title>
      <description><![CDATA[Kotlin Multiplatform ships one codebase to JVM, iOS, Android, JS, and native targets. The supply chain surface expands in specific ways worth tracking.]]></description>
      <link>https://safeguard.sh/resources/blog/kotlin-multiplatform-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kotlin-multiplatform-supply-chain-risks</guid>
      <pubDate>Sun, 12 May 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Disaster Recovery for Supply Chain Security Incidents]]></title>
      <description><![CDATA[When a critical dependency is compromised, your disaster recovery plan determines whether you recover in hours or weeks. Most DR plans do not cover this scenario.]]></description>
      <link>https://safeguard.sh/resources/blog/disaster-recovery-supply-chain-incidents</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/disaster-recovery-supply-chain-incidents</guid>
      <pubDate>Sun, 12 May 2024 10:00:00 GMT</pubDate>
      <category>Security Operations</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[False Positive Rates in Container Scanning: Why Your Scanner Lies to You]]></title>
      <description><![CDATA[Container scanners produce mountains of findings. A significant percentage are false positives. Here is how to measure and manage the noise.]]></description>
      <link>https://safeguard.sh/resources/blog/false-positive-rates-container-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/false-positive-rates-container-scanning</guid>
      <pubDate>Sun, 12 May 2024 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Executive Order 14028, Three Years Later: Progress, Gaps, and What Comes Next]]></title>
      <description><![CDATA[Three years after the landmark cybersecurity executive order, SBOM adoption is growing but uneven, secure development attestation is rolling out, and the gap between policy and practice remains wide.]]></description>
      <link>https://safeguard.sh/resources/blog/eo-14028-three-years-later-progress-report</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eo-14028-three-years-later-progress-report</guid>
      <pubDate>Sun, 12 May 2024 09:00:00 GMT</pubDate>
      <category>Policy & Compliance</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[CNCF Project Security Audits: What They Find and Why They Matter]]></title>
      <description><![CDATA[The Cloud Native Computing Foundation funds independent security audits for its projects. The findings reveal patterns that every cloud native adopter should understand.]]></description>
      <link>https://safeguard.sh/resources/blog/cncf-project-security-audits</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cncf-project-security-audits</guid>
      <pubDate>Sun, 12 May 2024 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Dell Data Breach Exposes 49 Million Customer Records via API Abuse]]></title>
      <description><![CDATA[In May 2024, Dell Technologies disclosed a breach exposing 49 million customer records after a threat actor exploited a partner portal API to scrape names, addresses, and purchase details, then attempted to sell the data online.]]></description>
      <link>https://safeguard.sh/resources/blog/dell-49-million-customer-records</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dell-49-million-customer-records</guid>
      <pubDate>Fri, 10 May 2024 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[APT29 Cozy Bear: Supply Chain Tradecraft]]></title>
      <description><![CDATA[How Russia's SVR-linked APT29 quietly industrialized supply chain compromise from SolarWinds to TeamCity and JetBrains tooling.]]></description>
      <link>https://safeguard.sh/resources/blog/apt29-cozy-bear-supply-chain-tradecraft</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apt29-cozy-bear-supply-chain-tradecraft</guid>
      <pubDate>Fri, 10 May 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AWS CodeBuild Supply Chain Hardening Guide]]></title>
      <description><![CDATA[CodeBuild projects are where most AWS supply chain compromises end up executing. Here is a practical hardening guide built from years of incident response, with specific buildspec controls and IAM patterns.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-codebuild-supply-chain-hardening-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-codebuild-supply-chain-hardening-guide</guid>
      <pubDate>Fri, 10 May 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Quantifying Digital Supply Chain Risk]]></title>
      <description><![CDATA[Security teams struggle to express supply chain risk in business terms. This guide covers frameworks and methods for quantifying dependency risk in ways that boards and executives actually understand.]]></description>
      <link>https://safeguard.sh/resources/blog/digital-supply-chain-risk-quantification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/digital-supply-chain-risk-quantification</guid>
      <pubDate>Wed, 08 May 2024 11:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Homebrew Cask Security Verification: What Gets Checked Before Installation]]></title>
      <description><![CDATA[Homebrew Cask installs macOS applications from the command line. Here is what security verification happens (and what does not) before software lands on your Mac.]]></description>
      <link>https://safeguard.sh/resources/blog/homebrew-cask-security-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/homebrew-cask-security-verification</guid>
      <pubDate>Wed, 08 May 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Maven Plugin Verification: Securing Your Java Build Pipeline]]></title>
      <description><![CDATA[Maven plugins execute during your build with full JVM access. Here is how to verify they are legitimate and have not been tampered with.]]></description>
      <link>https://safeguard.sh/resources/blog/maven-plugin-verification-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maven-plugin-verification-guide</guid>
      <pubDate>Wed, 08 May 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Next.js Security Hardening Guide]]></title>
      <description><![CDATA[Harden your Next.js application with secure headers, API route protection, and server component safety practices.]]></description>
      <link>https://safeguard.sh/resources/blog/nextjs-security-hardening-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nextjs-security-hardening-guide</guid>
      <pubDate>Wed, 08 May 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Third-Party Risk Management for Software Vendors]]></title>
      <description><![CDATA[A practical TPRM program for software vendors covering intake, tiering, annual review, SBOM ingestion, and continuous monitoring with staffing ratios and budgets.]]></description>
      <link>https://safeguard.sh/resources/blog/third-party-risk-management-software-vendors-program</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/third-party-risk-management-software-vendors-program</guid>
      <pubDate>Tue, 07 May 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Developer Workstation Forensics for Supply Chain]]></title>
      <description><![CDATA[Forensic procedures for a developer workstation that may have executed a malicious package, from live triage through full imaging.]]></description>
      <link>https://safeguard.sh/resources/blog/developer-workstation-forensics-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/developer-workstation-forensics-supply-chain</guid>
      <pubDate>Sun, 05 May 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Open Source AI Model Security: The Emerging Threat Landscape]]></title>
      <description><![CDATA[As open source AI models proliferate, their security implications extend far beyond traditional software vulnerabilities. Model poisoning, supply chain tampering, and unsafe deserialization create new attack surfaces.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-ai-model-security-landscape</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-ai-model-security-landscape</guid>
      <pubDate>Sun, 05 May 2024 12:00:00 GMT</pubDate>
      <category>Emerging Threats</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[GraphQL Injection Prevention: Securing Your API Layer]]></title>
      <description><![CDATA[GraphQL's flexible query language introduces injection risks that differ fundamentally from REST APIs. Preventing GraphQL injection requires understanding the query parser, resolver chain, and schema design.]]></description>
      <link>https://safeguard.sh/resources/blog/graphql-injection-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/graphql-injection-prevention</guid>
      <pubDate>Sun, 05 May 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[SAST Tool Accuracy Benchmarks 2024: What the Data Actually Shows]]></title>
      <description><![CDATA[Static Application Security Testing tools vary dramatically in accuracy. We analyze detection rates, false positive rates, and language coverage across leading SAST tools using standardized benchmarks.]]></description>
      <link>https://safeguard.sh/resources/blog/sast-tool-accuracy-benchmarks-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sast-tool-accuracy-benchmarks-2024</guid>
      <pubDate>Sun, 05 May 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Open Source Manager: Understanding the Health of Your Dependencies]]></title>
      <description><![CDATA[Vulnerability counts do not tell the full story. Open Source Manager evaluates the health, maintainability, and trustworthiness of the open-source projects your software depends on.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-open-source-manager-launch</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-open-source-manager-launch</guid>
      <pubDate>Wed, 01 May 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[AWS AppConfig Dynamic Config Security]]></title>
      <description><![CDATA[AppConfig ships configuration changes to running applications in seconds. That makes it a powerful tool and a compelling target. Here is how to run AppConfig safely.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-appconfig-dynamic-config-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-appconfig-dynamic-config-security</guid>
      <pubDate>Tue, 30 Apr 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Spring Dependency Management Supply Chain]]></title>
      <description><![CDATA[Spring Boot's dependency management is the unsung hero of the Java ecosystem, and it is also a supply chain seam worth understanding. Here is how BOMs, starters, and transitive version coercion shape what actually ships.]]></description>
      <link>https://safeguard.sh/resources/blog/spring-dependency-management-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spring-dependency-management-supply-chain</guid>
      <pubDate>Tue, 30 Apr 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Chronicle Security Supply Chain Queries]]></title>
      <description><![CDATA[Writing YARA-L detection rules and UDM queries in Google Chronicle (now Security Operations) to catch software supply chain threats at scale.]]></description>
      <link>https://safeguard.sh/resources/blog/chronicle-security-supply-chain-queries</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chronicle-security-supply-chain-queries</guid>
      <pubDate>Tue, 30 Apr 2024 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Critical Infrastructure Software Supply Chain]]></title>
      <description><![CDATA[How the 16 critical infrastructure sectors are absorbing software supply chain obligations under PPD-21, NSM-22, and CISA's emerging frameworks.]]></description>
      <link>https://safeguard.sh/resources/blog/critical-infrastructure-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/critical-infrastructure-software-supply-chain</guid>
      <pubDate>Sun, 28 Apr 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Twilio 2022 Incidents: Supply Chain Lessons]]></title>
      <description><![CDATA[Twilio disclosed two social engineering incidents in 2022 that cascaded through its customer base; the supply chain lessons remain relevant for any B2B vendor.]]></description>
      <link>https://safeguard.sh/resources/blog/twilio-2022-incidents-supply-chain-lessons</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/twilio-2022-incidents-supply-chain-lessons</guid>
      <pubDate>Sun, 28 Apr 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Coordinated Vulnerability Disclosure: A Complete Guide]]></title>
      <description><![CDATA[Coordinated disclosure protects users while giving vendors time to fix. Here is how to run a disclosure process that works for all parties, whether you are the reporter or the vendor.]]></description>
      <link>https://safeguard.sh/resources/blog/coordinated-vulnerability-disclosure-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/coordinated-vulnerability-disclosure-guide</guid>
      <pubDate>Sun, 28 Apr 2024 09:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[EU NIS2 Directive: What Software Supply Chain Teams Need to Know]]></title>
      <description><![CDATA[The NIS2 Directive imposes new cybersecurity obligations across the EU, with specific requirements for supply chain risk management that affect software vendors and their customers.]]></description>
      <link>https://safeguard.sh/resources/blog/eu-nis2-directive-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eu-nis2-directive-software-supply-chain</guid>
      <pubDate>Thu, 25 Apr 2024 12:00:00 GMT</pubDate>
      <category>Compliance & Frameworks</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Medical Device SBOM Requirements in Practice]]></title>
      <description><![CDATA[SBOMs for medical devices look straightforward on paper and get complicated fast in the real world. A field report on what regulators actually accept and what engineering teams actually produce.]]></description>
      <link>https://safeguard.sh/resources/blog/medical-device-sbom-requirements-practical</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/medical-device-sbom-requirements-practical</guid>
      <pubDate>Thu, 25 Apr 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[npm Registry Authentication Deep Dive]]></title>
      <description><![CDATA[The npm registry supports four distinct authentication flows. Most teams use one, badly. A tour of how auth actually works, what the tokens look like, and where the model breaks.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-registry-authentication-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-registry-authentication-deep-dive</guid>
      <pubDate>Thu, 25 Apr 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Corporate OSS Contribution Policies]]></title>
      <description><![CDATA[Google, Microsoft, Red Hat, and a long tail of smaller companies have built contribution policies that shape how their engineers participate in open source. The policies vary more than most assume.]]></description>
      <link>https://safeguard.sh/resources/blog/corporate-oss-contribution-policies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/corporate-oss-contribution-policies</guid>
      <pubDate>Mon, 22 Apr 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[1Password Secrets Automation in CI]]></title>
      <description><![CDATA[1Password has quietly become a credible secrets backend for CI/CD. A walkthrough of Connect, Service Accounts, and the CLI patterns that make 1Password Secrets Automation work in a build pipeline.]]></description>
      <link>https://safeguard.sh/resources/blog/one-password-secrets-automation-ci</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/one-password-secrets-automation-ci</guid>
      <pubDate>Mon, 22 Apr 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Supply Chain Attacks: Q1 2024 Roundup]]></title>
      <description><![CDATA[Q1 2024 brought typosquats, stealer campaigns, and a week-long new-user freeze on PyPI. Here is what the attacks looked like and how to defend.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-supply-chain-attacks-q1-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-supply-chain-attacks-q1-2024</guid>
      <pubDate>Mon, 22 Apr 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Taint Analysis for Zero-Day Discovery: A Primer]]></title>
      <description><![CDATA[A practitioner's walk-through of taint analysis as a zero-day discovery technique, from classic Livshits and Lam foundations to modern flow-sensitive engines.]]></description>
      <link>https://safeguard.sh/resources/blog/taint-analysis-for-zero-day-discovery-primer</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/taint-analysis-for-zero-day-discovery-primer</guid>
      <pubDate>Mon, 22 Apr 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Azure DevOps YAML Pipeline Hardening]]></title>
      <description><![CDATA[A practical, line-by-line walk through hardening Azure DevOps YAML pipelines — template injection, task version pinning, approvals, and the defaults that will bite you.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-devops-yaml-pipeline-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-devops-yaml-pipeline-hardening</guid>
      <pubDate>Sat, 20 Apr 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Container Security Scanning in 2024: Benchmarks, Tools, and What Actually Matters]]></title>
      <description><![CDATA[Container image scanning tools vary widely in detection rates, false positive rates, and coverage. Here is a practical assessment of the container security scanning landscape in 2024.]]></description>
      <link>https://safeguard.sh/resources/blog/container-security-scanning-benchmarks-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-security-scanning-benchmarks-2024</guid>
      <pubDate>Sat, 20 Apr 2024 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Conti Ransomware Supply Chain Patterns]]></title>
      <description><![CDATA[Before Conti splintered in 2022, its affiliates turned MSPs, RMM tools, and identity infrastructure into repeatable supply chain attack paths.]]></description>
      <link>https://safeguard.sh/resources/blog/conti-ransomware-supply-chain-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/conti-ransomware-supply-chain-patterns</guid>
      <pubDate>Thu, 18 Apr 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Palo Alto GlobalProtect Zero-Day: Response Timeline]]></title>
      <description><![CDATA[CVE-2024-3400 hit GlobalProtect with pre-auth RCE and ongoing exploitation. Here is the response timeline, the UPSTYLE tradecraft, and what worked.]]></description>
      <link>https://safeguard.sh/resources/blog/palo-alto-globalprotect-zero-day-response-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/palo-alto-globalprotect-zero-day-response-2024</guid>
      <pubDate>Thu, 18 Apr 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Package Namespace Governance]]></title>
      <description><![CDATA[PyPI's flat global namespace is one of Python packaging's oldest design decisions. How it's governed today, where the tension points are, and what the PEP 752 debate means for the future.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-package-namespace-governance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-package-namespace-governance</guid>
      <pubDate>Thu, 18 Apr 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[RubyGems 2FA Enforcement Analysis]]></title>
      <description><![CDATA[A look at how RubyGems.org rolled out mandatory 2FA for high-traffic gem maintainers, what it has caught, and what gaps still remain in the account-compromise defense story.]]></description>
      <link>https://safeguard.sh/resources/blog/rubygems-2fa-enforcement-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rubygems-2fa-enforcement-analysis</guid>
      <pubDate>Thu, 18 Apr 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Sigstore Rekor Transparency Log Operations]]></title>
      <description><![CDATA[Rekor is the transparency log behind Sigstore, and understanding its operational model matters more than most teams realise. Here is how we run against it in production.]]></description>
      <link>https://safeguard.sh/resources/blog/sigstore-rekor-transparency-log-operations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sigstore-rekor-transparency-log-operations</guid>
      <pubDate>Thu, 18 Apr 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Black Basta Ransomware: Techniques and Tactics in 2024]]></title>
      <description><![CDATA[Black Basta evolved from a Conti offshoot into one of the most technically advanced ransomware operations, using novel initial access methods and sophisticated evasion techniques.]]></description>
      <link>https://safeguard.sh/resources/blog/black-basta-ransomware-techniques-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/black-basta-ransomware-techniques-2024</guid>
      <pubDate>Thu, 18 Apr 2024 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Insurance Industry Software Risk Assessment and Supply Chain Security]]></title>
      <description><![CDATA[Insurers manage massive amounts of sensitive data through complex software systems. Here's how the insurance industry should approach software supply chain risk.]]></description>
      <link>https://safeguard.sh/resources/blog/insurance-industry-software-risk-assessment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/insurance-industry-software-risk-assessment</guid>
      <pubDate>Thu, 18 Apr 2024 08:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[UK Product Security and Telecommunications Infrastructure Act: Software Implications]]></title>
      <description><![CDATA[The UK's PSTI Act bans default passwords and mandates vulnerability disclosure. Here's what it means for software embedded in connected products.]]></description>
      <link>https://safeguard.sh/resources/blog/uk-product-security-telecommunications-act</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/uk-product-security-telecommunications-act</guid>
      <pubDate>Thu, 18 Apr 2024 08:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Penetration Testing CI/CD Pipelines]]></title>
      <description><![CDATA[Your CI/CD pipeline is a high-value target. Here's how to pen test build systems, artifact repositories, and deployment workflows for supply chain vulnerabilities.]]></description>
      <link>https://safeguard.sh/resources/blog/penetration-testing-ci-cd-pipelines</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/penetration-testing-ci-cd-pipelines</guid>
      <pubDate>Thu, 18 Apr 2024 00:00:00 GMT</pubDate>
      <category>Offensive Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[GCP Cloud Functions Supply Chain Risks]]></title>
      <description><![CDATA[The supply-chain risks unique to GCP Cloud Functions: dependency resolution at deploy time, buildpack trust, runtime identity, and the audit trail the service does and does not give you.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-cloud-functions-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-cloud-functions-supply-chain-risks</guid>
      <pubDate>Mon, 15 Apr 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Migrating Jenkins to GitHub Actions: Security]]></title>
      <description><![CDATA[A case study in moving a sprawling Jenkins estate to GitHub Actions without losing supply chain visibility, artifact integrity, or developer trust.]]></description>
      <link>https://safeguard.sh/resources/blog/migrating-from-jenkins-to-github-actions-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/migrating-from-jenkins-to-github-actions-security</guid>
      <pubDate>Mon, 15 Apr 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Incident Forensics Playbook]]></title>
      <description><![CDATA[A practical, hour-by-hour forensics playbook for responding to software supply chain incidents, from first alert through root cause and disclosure.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-incident-forensics-playbook</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-incident-forensics-playbook</guid>
      <pubDate>Mon, 15 Apr 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AWS Lambda Supply Chain Risks You Are Probably Ignoring]]></title>
      <description><![CDATA[Serverless does not mean secure. Here are the supply chain risks hiding in your Lambda functions and how to address them.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-lambda-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-lambda-supply-chain-risks</guid>
      <pubDate>Mon, 15 Apr 2024 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Managing Third-Party Software Risk With Safeguard TPRM]]></title>
      <description><![CDATA[Your vendors' software is your risk. Safeguard TPRM gives you continuous visibility into the supply chain security posture of every third-party product you depend on.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-tprm-third-party-risk</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-tprm-third-party-risk</guid>
      <pubDate>Mon, 15 Apr 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Sisense Data Breach: When Your Analytics Platform Becomes the Threat]]></title>
      <description><![CDATA[CISA issued a rare advisory urging Sisense customers to reset credentials after attackers compromised the business intelligence platform, potentially accessing customer data across thousands of organizations.]]></description>
      <link>https://safeguard.sh/resources/blog/sisense-breach-cisa-advisory</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sisense-breach-cisa-advisory</guid>
      <pubDate>Mon, 15 Apr 2024 09:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[SPDX 3.0: What Changed and Why It Matters]]></title>
      <description><![CDATA[SPDX 3.0 is a major overhaul of the ISO-standard SBOM format. Here is a practical breakdown of the new profile system, linking model, and what it means for adoption.]]></description>
      <link>https://safeguard.sh/resources/blog/spdx-3-0-specification-what-changed</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spdx-3-0-specification-what-changed</guid>
      <pubDate>Mon, 15 Apr 2024 09:00:00 GMT</pubDate>
      <category>SBOM Standards</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Privacy Engineering in Software Supply Chains]]></title>
      <description><![CDATA[Privacy by design cannot stop at your own code. Every dependency, every third-party service, every SDK in your supply chain is a privacy decision. Here is how to engineer privacy across the full stack.]]></description>
      <link>https://safeguard.sh/resources/blog/privacy-engineering-supply-chains</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/privacy-engineering-supply-chains</guid>
      <pubDate>Mon, 15 Apr 2024 00:00:00 GMT</pubDate>
      <category>Privacy</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Australia's Essential Eight and Software Supply Chain]]></title>
      <description><![CDATA[The ACSC's November 2023 Essential Eight update tightened patching, application control, and software inventory expectations that every Australian-regulated entity now has to evidence.]]></description>
      <link>https://safeguard.sh/resources/blog/australia-essential-eight-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/australia-essential-eight-supply-chain</guid>
      <pubDate>Sun, 14 Apr 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Roku Credential Stuffing Attacks Compromise 576,000 Accounts]]></title>
      <description><![CDATA[In April 2024, Roku disclosed that two separate credential stuffing campaigns had compromised approximately 576,000 customer accounts, with attackers making fraudulent purchases and changing account details on some affected accounts.]]></description>
      <link>https://safeguard.sh/resources/blog/roku-576000-accounts-credential-stuffing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/roku-576000-accounts-credential-stuffing</guid>
      <pubDate>Fri, 12 Apr 2024 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Go Dependency Visualization for Security]]></title>
      <description><![CDATA[The Go module graph is comparatively small, which makes it one of the few ecosystems where visualizing dependencies is actually useful for security review rather than just pretty.]]></description>
      <link>https://safeguard.sh/resources/blog/go-dependency-visualization-for-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-dependency-visualization-for-security</guid>
      <pubDate>Fri, 12 Apr 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[BuildKit Cache Security Considerations for Container Builds]]></title>
      <description><![CDATA[BuildKit's caching is what makes container builds fast. It is also a potential vector for cache poisoning attacks if not properly secured.]]></description>
      <link>https://safeguard.sh/resources/blog/buildkit-cache-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/buildkit-cache-security-considerations</guid>
      <pubDate>Fri, 12 Apr 2024 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Envoy Proxy Security Hardening for Production Deployments]]></title>
      <description><![CDATA[Envoy powers service meshes and API gateways across the industry. Its default configuration prioritizes connectivity over security. Here is how to fix that.]]></description>
      <link>https://safeguard.sh/resources/blog/envoy-proxy-security-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/envoy-proxy-security-hardening</guid>
      <pubDate>Fri, 12 Apr 2024 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[IoT Firmware SBOMs: From Nice-to-Have to Regulatory Requirement]]></title>
      <description><![CDATA[Government mandates and industry standards are making SBOMs mandatory for IoT firmware. Here's what manufacturers need to know to comply.]]></description>
      <link>https://safeguard.sh/resources/blog/iot-firmware-sbom-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/iot-firmware-sbom-requirements</guid>
      <pubDate>Fri, 12 Apr 2024 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Palo Alto PAN-OS Zero-Day CVE-2024-3400: Command Injection in GlobalProtect]]></title>
      <description><![CDATA[A critical command injection vulnerability in Palo Alto Networks PAN-OS GlobalProtect feature was exploited as a zero-day, giving attackers root access to firewalls protecting enterprise networks.]]></description>
      <link>https://safeguard.sh/resources/blog/palo-alto-pan-os-cve-2024-3400-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/palo-alto-pan-os-cve-2024-3400-zero-day</guid>
      <pubDate>Fri, 12 Apr 2024 08:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Open-Source Contribution Security Guide]]></title>
      <description><![CDATA[How to contribute to open-source projects without introducing security vulnerabilities, and how to evaluate the security posture of projects you contribute to.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-contribution-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-contribution-security-guide</guid>
      <pubDate>Fri, 12 Apr 2024 00:00:00 GMT</pubDate>
      <category>Organizational Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Django Security Best Practices, 2024 Edition]]></title>
      <description><![CDATA[From SECRET_KEY hygiene to middleware ordering, the Django security checklist worth actually following in 2024, grounded in real CVEs and production incidents.]]></description>
      <link>https://safeguard.sh/resources/blog/django-security-best-practices-2024-edition</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/django-security-best-practices-2024-edition</guid>
      <pubDate>Wed, 10 Apr 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Compliance Dashboard Design Patterns for Supply Chain Security]]></title>
      <description><![CDATA[Compliance dashboards translate complex supply chain data into actionable views for auditors, executives, and engineering teams. These design patterns make the difference between a dashboard that drives action and one that collects dust.]]></description>
      <link>https://safeguard.sh/resources/blog/compliance-dashboard-design-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/compliance-dashboard-design-patterns</guid>
      <pubDate>Wed, 10 Apr 2024 10:00:00 GMT</pubDate>
      <category>SBOM and Compliance</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[CISA's Secure by Design Pledge: Voluntary Commitments with Real Teeth]]></title>
      <description><![CDATA[CISA launched a voluntary pledge asking software manufacturers to commit to specific security improvements. Over 100 companies signed. Here is what the pledge actually requires and whether it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-secure-by-design-pledge</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-secure-by-design-pledge</guid>
      <pubDate>Wed, 10 Apr 2024 09:00:00 GMT</pubDate>
      <category>Policy & Compliance</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Bazel Hermetic Builds: Supply Chain Benefits]]></title>
      <description><![CDATA[How Bazel's hermeticity model reduces supply chain risk, with concrete WORKSPACE and MODULE.bazel examples from real migrations.]]></description>
      <link>https://safeguard.sh/resources/blog/bazel-hermetic-builds-supply-chain-benefits</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bazel-hermetic-builds-supply-chain-benefits</guid>
      <pubDate>Mon, 08 Apr 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[HIPAA Meets HITRUST: Supply Chain Depth]]></title>
      <description><![CDATA[HIPAA's Security Rule is thin on supply chain specifics. HITRUST CSF fills the gap with prescriptive third-party and software controls. Here's how the two frameworks intersect and how to build a program that satisfies both.]]></description>
      <link>https://safeguard.sh/resources/blog/hipaa-meets-hitrust-supply-chain-depth</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/hipaa-meets-hitrust-supply-chain-depth</guid>
      <pubDate>Mon, 08 Apr 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Network Policies: The Supply Chain Angle]]></title>
      <description><![CDATA[Network policies are usually framed as a zero-trust tool. They are also one of the best defenses against a compromised dependency.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-network-policies-supply-chain-angle</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-network-policies-supply-chain-angle</guid>
      <pubDate>Mon, 08 Apr 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PowerShell Module Supply Chain Security]]></title>
      <description><![CDATA[PowerShell modules are a supply chain people forget exists, and the trust model is weaker than NuGet's. Here is why that matters.]]></description>
      <link>https://safeguard.sh/resources/blog/powershell-module-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/powershell-module-supply-chain-security</guid>
      <pubDate>Mon, 08 Apr 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How Often Should You Scan for Vulnerabilities?]]></title>
      <description><![CDATA[Finding the right vulnerability scanning frequency for your organization. Too often wastes resources, too rarely leaves gaps. Here is how to calibrate.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-scanning-frequency-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-scanning-frequency-guide</guid>
      <pubDate>Mon, 08 Apr 2024 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[WebSocket Security in Modern Applications]]></title>
      <description><![CDATA[WebSockets enable real-time communication but introduce attack surfaces that traditional HTTP security controls miss entirely.]]></description>
      <link>https://safeguard.sh/resources/blog/websocket-security-modern-applications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/websocket-security-modern-applications</guid>
      <pubDate>Mon, 08 Apr 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[AI Model Poisoning: Detection Techniques for the Software Supply Chain]]></title>
      <description><![CDATA[Poisoned AI models are a supply chain threat that traditional security tools can't detect. Here are the emerging techniques for identifying compromised models.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-model-poisoning-detection-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-model-poisoning-detection-techniques</guid>
      <pubDate>Mon, 08 Apr 2024 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Secrets Management: Vault, Sealed Secrets, SOPS, and External Secrets Compared]]></title>
      <description><![CDATA[Kubernetes Secrets are base64-encoded, not encrypted. That is the start of the problem. Here is a no-nonsense comparison of the tools that actually solve secrets management in Kubernetes.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-secrets-management-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-secrets-management-comparison</guid>
      <pubDate>Mon, 08 Apr 2024 00:00:00 GMT</pubDate>
      <category>Kubernetes Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Latin America's Evolving Cybersecurity Regulations and Supply Chain Implications]]></title>
      <description><![CDATA[From Brazil's LGPD to Mexico's cybersecurity reforms, Latin America is building a regulatory framework that will reshape how organizations manage software supply chain risk across the region.]]></description>
      <link>https://safeguard.sh/resources/blog/latin-america-cybersecurity-regulations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/latin-america-cybersecurity-regulations</guid>
      <pubDate>Mon, 08 Apr 2024 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[cargo audit vs cargo deny]]></title>
      <description><![CDATA[A practical head-to-head between cargo-audit 0.21 and cargo-deny 0.16 based on six months of running both in production CI pipelines.]]></description>
      <link>https://safeguard.sh/resources/blog/cargo-audit-vs-cargo-deny-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cargo-audit-vs-cargo-deny-comparison</guid>
      <pubDate>Fri, 05 Apr 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[XZ Utils Backdoor: Technical Breakdown]]></title>
      <description><![CDATA[The xz-utils backdoor (CVE-2024-3094) nearly compromised SSH on every modern Linux distro. Here is how the implant worked and what it teaches us.]]></description>
      <link>https://safeguard.sh/resources/blog/xz-utils-backdoor-technical-breakdown</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xz-utils-backdoor-technical-breakdown</guid>
      <pubDate>Fri, 05 Apr 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Prototype Pollution in JavaScript: Prevention Guide]]></title>
      <description><![CDATA[Prototype pollution lets attackers modify the behavior of all JavaScript objects by injecting properties into Object.prototype. This guide covers exploitation techniques, real-world impact, and layered defenses.]]></description>
      <link>https://safeguard.sh/resources/blog/prototype-pollution-javascript-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/prototype-pollution-javascript-prevention</guid>
      <pubDate>Fri, 05 Apr 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Threat Intelligence Feeds for Supply Chain Security]]></title>
      <description><![CDATA[Supply chain threat intelligence goes beyond CVE databases. Specialized feeds track malicious packages, compromised maintainers, and emerging attack techniques targeting the software supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/threat-intelligence-feeds-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/threat-intelligence-feeds-supply-chain</guid>
      <pubDate>Fri, 05 Apr 2024 10:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[After XZ Utils: Rethinking Trust in Open Source Software]]></title>
      <description><![CDATA[The XZ Utils backdoor forced the industry to confront uncomfortable questions about maintainer trust, funding, and the structural fragility of critical open source infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/xz-utils-lessons-for-open-source-trust</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xz-utils-lessons-for-open-source-trust</guid>
      <pubDate>Fri, 05 Apr 2024 09:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Enterprise SCA Tool Evaluation Framework]]></title>
      <description><![CDATA[Choosing a software composition analysis tool for the enterprise? Here's a structured evaluation framework covering what actually matters.]]></description>
      <link>https://safeguard.sh/resources/blog/enterprise-sca-tool-evaluation-framework</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/enterprise-sca-tool-evaluation-framework</guid>
      <pubDate>Fri, 05 Apr 2024 08:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Mend vs Black Duck: Functional Comparison]]></title>
      <description><![CDATA[Compare Mend (formerly WhiteSource) and Black Duck on SBOM export, license policy, detection sources, deployment model, and enterprise reporting for 2024 SCA selection.]]></description>
      <link>https://safeguard.sh/resources/blog/mend-vs-black-duck-functional-comparison-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mend-vs-black-duck-functional-comparison-2024</guid>
      <pubDate>Wed, 03 Apr 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Jenkins Pipeline Supply Chain Security]]></title>
      <description><![CDATA[How Jenkins pipelines end up as supply chain attack vectors, covering Groovy sandbox risks, plugin CVEs, credential binding, and practical hardening for Jenkins 2.440+.]]></description>
      <link>https://safeguard.sh/resources/blog/jenkins-pipeline-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jenkins-pipeline-supply-chain-security</guid>
      <pubDate>Tue, 02 Apr 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Forking Security: What Happens When Open Source Projects Diverge]]></title>
      <description><![CDATA[When an open source project forks, the security implications cascade through every downstream consumer. Understanding fork dynamics is essential for managing supply chain risk.]]></description>
      <link>https://safeguard.sh/resources/blog/forking-security-when-projects-diverge</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/forking-security-when-projects-diverge</guid>
      <pubDate>Tue, 02 Apr 2024 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Safeguard Portal: Giving Your Customers a Window Into Your Supply Chain]]></title>
      <description><![CDATA[The Safeguard Portal lets you share SBOM data, vulnerability status, and compliance documentation with customers through a branded, self-service interface.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-portal-customer-transparency</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-portal-customer-transparency</guid>
      <pubDate>Mon, 01 Apr 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[How One Engineer's Curiosity Saved Linux: The XZ Utils Backdoor Discovery Story]]></title>
      <description><![CDATA[Andres Freund noticed SSH was 500ms slower than expected. That observation prevented the most dangerous supply chain attack in open source history from reaching stable Linux distributions.]]></description>
      <link>https://safeguard.sh/resources/blog/xz-utils-backdoor-how-it-was-discovered</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xz-utils-backdoor-how-it-was-discovered</guid>
      <pubDate>Mon, 01 Apr 2024 09:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[PCI DSS 4.0 Software Security Requirements]]></title>
      <description><![CDATA[PCI DSS 4.0 became mandatory on March 31, 2024, overhauling software security, SBOM visibility, and supply chain controls for every entity that touches cardholder data.]]></description>
      <link>https://safeguard.sh/resources/blog/pci-dss-4-0-software-security-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pci-dss-4-0-software-security-requirements</guid>
      <pubDate>Sun, 31 Mar 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AT&T Data Breach: 73 Million Customer Records Surface on the Dark Web]]></title>
      <description><![CDATA[In March 2024, AT&T confirmed that a dataset containing personal information of approximately 73 million current and former customers, including encrypted passcodes, had been published on the dark web, three years after its initial appearance.]]></description>
      <link>https://safeguard.sh/resources/blog/att-73-million-records-dark-web</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/att-73-million-records-dark-web</guid>
      <pubDate>Sat, 30 Mar 2024 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[XZ Utils Backdoor (CVE-2024-3094): The Most Sophisticated Supply Chain Attack Ever Discovered]]></title>
      <description><![CDATA[A multi-year social engineering campaign planted a backdoor in XZ Utils that would have compromised SSH on most Linux distributions. Technical deep dive into what happened.]]></description>
      <link>https://safeguard.sh/resources/blog/xz-utils-backdoor-cve-2024-3094-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xz-utils-backdoor-cve-2024-3094-analysis</guid>
      <pubDate>Fri, 29 Mar 2024 08:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Go Proxy and Private Module Security]]></title>
      <description><![CDATA[Mixing public and private modules through a Go proxy is where most teams get their configuration wrong, and the mistakes range from leaked module names to accepted unverified code.]]></description>
      <link>https://safeguard.sh/resources/blog/go-proxy-private-module-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-proxy-private-module-security</guid>
      <pubDate>Thu, 28 Mar 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Ninja Build Supply Chain Considerations]]></title>
      <description><![CDATA[Ninja is a low-level build tool, not a package manager. That framing matters for understanding its supply chain properties and common misconceptions.]]></description>
      <link>https://safeguard.sh/resources/blog/ninja-build-supply-chain-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ninja-build-supply-chain-considerations</guid>
      <pubDate>Thu, 28 Mar 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Splunk Supply Chain Detection Content Pack]]></title>
      <description><![CDATA[A practical look at building a Splunk content pack for software supply chain threats, with SPL searches for CI/CD anomalies, package registry abuse, and build provenance violations.]]></description>
      <link>https://safeguard.sh/resources/blog/splunk-supply-chain-detection-content-pack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/splunk-supply-chain-detection-content-pack</guid>
      <pubDate>Thu, 28 Mar 2024 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GCP Cloud Run Supply Chain Security]]></title>
      <description><![CDATA[A practical playbook for protecting the supply chain of services running on Cloud Run: image provenance, Binary Authorization, runtime identity, and the gaps the default configuration leaves wide open.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-cloud-run-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-cloud-run-supply-chain-security</guid>
      <pubDate>Mon, 25 Mar 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Advanced Security vs Alternatives, Early 2024]]></title>
      <description><![CDATA[GitHub Advanced Security anchors many AppSec programs in 2024, but Snyk, Semgrep, Endor, and others are credible alternatives. Here is an honest comparison.]]></description>
      <link>https://safeguard.sh/resources/blog/github-advanced-security-vs-alternatives-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-advanced-security-vs-alternatives-2024</guid>
      <pubDate>Mon, 25 Mar 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Maven Enforcer Plugin Security Rules]]></title>
      <description><![CDATA[Maven Enforcer is a blunt instrument most teams underuse. Here is how to turn it into a supply chain guardrail that blocks bad versions, bad repositories, and bad dependency graphs before they ship.]]></description>
      <link>https://safeguard.sh/resources/blog/maven-enforcer-plugin-security-rules</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maven-enforcer-plugin-security-rules</guid>
      <pubDate>Mon, 25 Mar 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SLSA Build L1 to L3 Migration Playbook]]></title>
      <description><![CDATA[Moving from SLSA Build L1 to L3 is less a single upgrade and more a series of hardening steps. Here is the playbook we use with customers, mapped to the v1.0 specification.]]></description>
      <link>https://safeguard.sh/resources/blog/slsa-build-l1-to-l3-migration-playbook</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/slsa-build-l1-to-l3-migration-playbook</guid>
      <pubDate>Mon, 25 Mar 2024 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Firewalls: Concept, Architecture, and Implementation]]></title>
      <description><![CDATA[A dependency firewall sits between your build system and public registries, filtering packages based on security policies. Here is how to design and implement one.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-firewall-concept-implementation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-firewall-concept-implementation</guid>
      <pubDate>Mon, 25 Mar 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Defense Industrial Base Supply Chain and CMMC]]></title>
      <description><![CDATA[How the Defense Industrial Base is adapting its software supply chain to CMMC 2.0, NIST SP 800-171, and DFARS flow-down obligations.]]></description>
      <link>https://safeguard.sh/resources/blog/defense-industrial-base-supply-chain-cmmc</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/defense-industrial-base-supply-chain-cmmc</guid>
      <pubDate>Fri, 22 Mar 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NestJS Enterprise Security Guide]]></title>
      <description><![CDATA[NestJS dominates the enterprise Node.js space because of its Angular-style decorators, dependency injection, and opinionated project structure. Those same properties create a distinctive security surface worth understanding carefully.]]></description>
      <link>https://safeguard.sh/resources/blog/nest-js-enterprise-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nest-js-enterprise-security-guide</guid>
      <pubDate>Fri, 22 Mar 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Post-Quantum Cryptography Transition: A Practical Guide for Engineering Teams]]></title>
      <description><![CDATA[NIST has finalized its post-quantum standards. Here's a hands-on guide for engineering teams beginning the migration from classical to quantum-resistant cryptography.]]></description>
      <link>https://safeguard.sh/resources/blog/post-quantum-cryptography-transition-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/post-quantum-cryptography-transition-guide</guid>
      <pubDate>Fri, 22 Mar 2024 10:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Wolfi OS: The Linux Distribution Built for Secure Containers]]></title>
      <description><![CDATA[Wolfi is not a general-purpose Linux distro. It exists to solve one problem: provide secure, minimal, up-to-date packages for container images. Here is why that matters and how to use it.]]></description>
      <link>https://safeguard.sh/resources/blog/wolfi-os-container-base-image-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/wolfi-os-container-base-image-security</guid>
      <pubDate>Fri, 22 Mar 2024 00:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[npm Lifecycle Scripts: The Hidden Attack Surface in Your Node.js Supply Chain]]></title>
      <description><![CDATA[npm lifecycle scripts execute arbitrary code during package installation. This design choice creates one of the largest and least-understood attack surfaces in modern software development.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-lifecycle-scripts-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-lifecycle-scripts-security-risks</guid>
      <pubDate>Wed, 20 Mar 2024 12:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Rust Build Scripts: A Supply Chain Risk Profile]]></title>
      <description><![CDATA[Why build.rs is the highest-leverage attack surface in the Rust ecosystem, with concrete examples from 2023 and 2024 incidents.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-supply-chain-build-scripts-risk</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-supply-chain-build-scripts-risk</guid>
      <pubDate>Wed, 20 Mar 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Prisma Cloud Container Security: Palo Alto's Cloud Native Play]]></title>
      <description><![CDATA[A review of Prisma Cloud's container and cloud workload security features, covering image scanning, runtime protection, compliance, and the Twistlock heritage.]]></description>
      <link>https://safeguard.sh/resources/blog/prisma-cloud-container-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/prisma-cloud-container-security-review</guid>
      <pubDate>Wed, 20 Mar 2024 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[AWS Lambda Layers: Supply Chain Risks]]></title>
      <description><![CDATA[Lambda layers feel like a convenience but they are a supply chain attack surface that most teams do not treat as code. Here is how they get abused and what to do about it.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-lambda-layers-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-lambda-layers-supply-chain-risks</guid>
      <pubDate>Mon, 18 Mar 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Okta 2022-2023 Incidents: Supply Chain Lessons]]></title>
      <description><![CDATA[A retrospective on Okta's string of security incidents from 2022 through 2023 and what they teach us about identity providers as critical supply chain dependencies.]]></description>
      <link>https://safeguard.sh/resources/blog/okta-2022-2023-incidents-supply-chain-lessons</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/okta-2022-2023-incidents-supply-chain-lessons</guid>
      <pubDate>Mon, 18 Mar 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Single-Maintainer Bus Factor Risk in OSS]]></title>
      <description><![CDATA[A single person maintaining critical infrastructure is one medical emergency, burnout, or coercion event away from a supply chain crisis. The bus factor is not a theoretical metric.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-single-maintainer-bus-factor-risk</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-single-maintainer-bus-factor-risk</guid>
      <pubDate>Mon, 18 Mar 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SOC 2 Meets SSDF: A Practical Mapping]]></title>
      <description><![CDATA[SOC 2 auditors are starting to ask about secure development practices. Here's how to map NIST SSDF tasks onto SOC 2 Trust Services Criteria without duplicating work.]]></description>
      <link>https://safeguard.sh/resources/blog/soc2-meets-ssdf-mapping-practical</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/soc2-meets-ssdf-mapping-practical</guid>
      <pubDate>Mon, 18 Mar 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cloud Security Posture Management: A No-Nonsense Guide]]></title>
      <description><![CDATA[What CSPM actually does, where it falls short, and how to get real value from posture management instead of drowning in alerts.]]></description>
      <link>https://safeguard.sh/resources/blog/cloud-security-posture-management-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloud-security-posture-management-guide</guid>
      <pubDate>Mon, 18 Mar 2024 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Node.js Permission Model: Restricting What Your Code Can Do]]></title>
      <description><![CDATA[Node.js finally has an experimental permission model. It is a significant step toward containing supply chain attacks, but it has important limitations.]]></description>
      <link>https://safeguard.sh/resources/blog/nodejs-permission-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nodejs-permission-model</guid>
      <pubDate>Mon, 18 Mar 2024 10:00:00 GMT</pubDate>
      <category>Secure Development</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[GitHub's Supply Chain Security Features]]></title>
      <description><![CDATA[A comprehensive look at GitHub's evolving supply chain security toolkit, from Dependabot to code scanning, and how these features are reshaping how developers manage dependency risk.]]></description>
      <link>https://safeguard.sh/resources/blog/github-supply-chain-security-features</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-supply-chain-security-features</guid>
      <pubDate>Mon, 18 Mar 2024 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Where Technical Debt Meets Security Debt]]></title>
      <description><![CDATA[Technical debt and security debt are deeply intertwined. Untangling them requires understanding how shortcuts in code quality create openings for attackers.]]></description>
      <link>https://safeguard.sh/resources/blog/technical-debt-security-debt-intersection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/technical-debt-security-debt-intersection</guid>
      <pubDate>Mon, 18 Mar 2024 00:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Vault Supply Chain Integration Patterns]]></title>
      <description><![CDATA[HashiCorp Vault is a Swiss Army knife for secrets, but most teams use it as a glorified key-value store. A walkthrough of the integration patterns that make Vault actually useful in a CI/CD supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/hashicorp-vault-supply-chain-integration-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/hashicorp-vault-supply-chain-integration-patterns</guid>
      <pubDate>Fri, 15 Mar 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Ruby Gem Reserved Names Policy]]></title>
      <description><![CDATA[How RubyGems.org handles reserved gem names, what protections exist for trademark holders, and where the policy creates friction for legitimate namespace claims.]]></description>
      <link>https://safeguard.sh/resources/blog/ruby-gem-reserved-names-policy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ruby-gem-reserved-names-policy</guid>
      <pubDate>Fri, 15 Mar 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[ESSCM: Enterprise SBOM Management at Scale]]></title>
      <description><![CDATA[Managing SBOMs across hundreds of products requires more than file storage. ESSCM brings lifecycle management, versioning, and queryability to your software inventory.]]></description>
      <link>https://safeguard.sh/resources/blog/safeguard-esscm-enterprise-sbom-management</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/safeguard-esscm-enterprise-sbom-management</guid>
      <pubDate>Fri, 15 Mar 2024 10:00:00 GMT</pubDate>
      <category>Product</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[NIST NVD Slowdown: What the Vulnerability Enrichment Backlog Means for Security Teams]]></title>
      <description><![CDATA[NIST's National Vulnerability Database nearly stopped enriching CVEs in early 2024, creating a growing backlog that left security teams without the severity scores and metadata they depend on.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-nvd-slowdown-vulnerability-enrichment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-nvd-slowdown-vulnerability-enrichment</guid>
      <pubDate>Fri, 15 Mar 2024 09:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Security Testing for Data Pipelines: A Practical Guide]]></title>
      <description><![CDATA[Data pipelines ingest, transform, and move sensitive information across systems. Here is how to identify and address the security risks that traditional application testing misses.]]></description>
      <link>https://safeguard.sh/resources/blog/security-testing-data-pipelines</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-testing-data-pipelines</guid>
      <pubDate>Fri, 15 Mar 2024 09:00:00 GMT</pubDate>
      <category>AppSec</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Account Recovery: A Security Model Review]]></title>
      <description><![CDATA[Account recovery is where most identity systems leak security, and PyPI is no exception. A close look at how recovery works today, where the edges are, and what enterprise publishers should plan around.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-account-recovery-security-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-account-recovery-security-model</guid>
      <pubDate>Thu, 14 Mar 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Azure Functions Supply Chain Security]]></title>
      <description><![CDATA[Azure Functions hide a surprising amount of supply chain risk — Oryx builds, run-from-package, extension bundles, and the way deployment slots interact with identity.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-functions-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-functions-supply-chain-security</guid>
      <pubDate>Tue, 12 Mar 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Chocolatey Package Security on Windows: What You Need to Know]]></title>
      <description><![CDATA[Chocolatey is the de facto package manager for Windows automation. Its trust model and security features deserve more scrutiny than most teams give them.]]></description>
      <link>https://safeguard.sh/resources/blog/chocolatey-package-security-windows</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chocolatey-package-security-windows</guid>
      <pubDate>Tue, 12 Mar 2024 10:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[.NET Trimming Security Implications: What Gets Cut and Why It Matters]]></title>
      <description><![CDATA[IL trimming reduces .NET application size but can silently remove security-relevant code paths. Here is what you need to watch for.]]></description>
      <link>https://safeguard.sh/resources/blog/dotnet-trimming-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dotnet-trimming-security-implications</guid>
      <pubDate>Tue, 12 Mar 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Security Architecture Review Process: A Practical Framework]]></title>
      <description><![CDATA[Architecture reviews catch security issues before code is written. Most organizations skip them or do them poorly. Here is a process that works.]]></description>
      <link>https://safeguard.sh/resources/blog/security-architecture-review-process</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-architecture-review-process</guid>
      <pubDate>Tue, 12 Mar 2024 10:00:00 GMT</pubDate>
      <category>Security Operations</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Energy Sector Software Security and NERC CIP Compliance]]></title>
      <description><![CDATA[Power utilities and energy companies must secure software supply chains while meeting NERC CIP requirements. Here's a practical approach.]]></description>
      <link>https://safeguard.sh/resources/blog/energy-sector-software-security-nerc-cip</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/energy-sector-software-security-nerc-cip</guid>
      <pubDate>Tue, 12 Mar 2024 09:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Endor Labs SCA Review: Reachability Analysis Changes the Game]]></title>
      <description><![CDATA[A review of Endor Labs and its reachability-based approach to software composition analysis, examining how call graph analysis reduces vulnerability noise.]]></description>
      <link>https://safeguard.sh/resources/blog/endor-labs-sca-platform-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/endor-labs-sca-platform-review</guid>
      <pubDate>Tue, 12 Mar 2024 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Flutter and Dart Dependency Security: A Practical Guide]]></title>
      <description><![CDATA[Flutter apps pull dozens of Dart packages from pub.dev. Most teams never audit them. Here is how to manage dependency security in the Flutter ecosystem without slowing down development.]]></description>
      <link>https://safeguard.sh/resources/blog/flutter-dart-dependency-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/flutter-dart-dependency-security-guide</guid>
      <pubDate>Tue, 12 Mar 2024 00:00:00 GMT</pubDate>
      <category>Developer Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CISA Secure Software Development Attestation: What Vendors Must Know]]></title>
      <description><![CDATA[CISA now requires software vendors selling to the US government to attest to secure development practices. Here's what the form demands and how to prepare.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-secure-software-development-attestation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-secure-software-development-attestation</guid>
      <pubDate>Mon, 11 Mar 2024 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CISA KEV Catalog Growth: A 2024 Q1 Analysis]]></title>
      <description><![CDATA[CISA added 40+ CVEs to the Known Exploited Vulnerabilities catalog in Q1 2024. We break down the vendor mix, the edge-device bias, and what to prioritize.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-kev-catalog-growth-analysis-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-kev-catalog-growth-analysis-2024</guid>
      <pubDate>Sun, 10 Mar 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[.NET 8 Supply Chain Improvements]]></title>
      <description><![CDATA[.NET 8 quietly shipped several supply chain improvements worth knowing — NuGet audit, signed packages, SBOM tooling, and better source-link coverage.]]></description>
      <link>https://safeguard.sh/resources/blog/dotnet-8-supply-chain-improvements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dotnet-8-supply-chain-improvements</guid>
      <pubDate>Sun, 10 Mar 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes CVE-2024-3177: Bypassing Mountable Secrets Policy]]></title>
      <description><![CDATA[A medium-severity Kubernetes vulnerability allowed pods to access secrets they should not have been able to mount, undermining RBAC-based secret isolation in multi-tenant clusters.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-vulnerability-cve-2024-3177</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-vulnerability-cve-2024-3177</guid>
      <pubDate>Sun, 10 Mar 2024 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[BianLian's Pivot: From Ransomware Encryption to Pure Data Extortion]]></title>
      <description><![CDATA[BianLian abandoned encryption entirely in favor of data theft and extortion. This shift reveals where ransomware economics are heading — and why traditional defenses are lagging behind.]]></description>
      <link>https://safeguard.sh/resources/blog/bianlian-ransomware-data-extortion-evolution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bianlian-ransomware-data-extortion-evolution</guid>
      <pubDate>Sun, 10 Mar 2024 00:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[CI/CD Compromise Investigation Steps]]></title>
      <description><![CDATA[A step-by-step investigation playbook for suspected CI/CD pipeline compromise, from runner forensics to secrets rotation.]]></description>
      <link>https://safeguard.sh/resources/blog/ci-cd-compromise-investigation-steps</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ci-cd-compromise-investigation-steps</guid>
      <pubDate>Fri, 08 Mar 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How to Publish an npm Package With Provenance]]></title>
      <description><![CDATA[A step-by-step tutorial for publishing npm packages with provenance attestations so your consumers can cryptographically verify the build source.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-publish-npm-package-with-provenance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-publish-npm-package-with-provenance</guid>
      <pubDate>Fri, 08 Mar 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Tekton Pipelines Hardening Guide]]></title>
      <description><![CDATA[A practical hardening guide for Tekton Pipelines covering TaskRun isolation, step image provenance, workspace secrets, and the CVE history that shaped the current defaults.]]></description>
      <link>https://safeguard.sh/resources/blog/tekton-pipelines-hardening-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/tekton-pipelines-hardening-guide</guid>
      <pubDate>Fri, 08 Mar 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[VM to Container: Supply Chain Implications of the Migration]]></title>
      <description><![CDATA[What changes in your software supply chain when you move from virtual machines to containers, and how to adapt governance, scanning, and provenance accordingly.]]></description>
      <link>https://safeguard.sh/resources/blog/vm-to-container-supply-chain-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vm-to-container-supply-chain-implications</guid>
      <pubDate>Fri, 08 Mar 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Certificate Pinning for Software Updates: When and How to Pin]]></title>
      <description><![CDATA[Certificate pinning can protect your update channel from MITM attacks, but it introduces operational complexity. Here is when pinning makes sense and how to do it safely.]]></description>
      <link>https://safeguard.sh/resources/blog/certificate-pinning-software-updates</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/certificate-pinning-software-updates</guid>
      <pubDate>Fri, 08 Mar 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Mobile Application Security Testing: Beyond the OWASP Mobile Top 10]]></title>
      <description><![CDATA[Mobile apps have unique security challenges that web-focused tools miss entirely. Here is a practical testing methodology for iOS and Android.]]></description>
      <link>https://safeguard.sh/resources/blog/mobile-application-security-testing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mobile-application-security-testing</guid>
      <pubDate>Fri, 08 Mar 2024 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Security KPI Frameworks: Measuring What Matters Without Drowning in Metrics]]></title>
      <description><![CDATA[Most security metrics measure activity, not outcomes. Here is how to build a KPI framework that tells leadership whether the security program is actually reducing risk.]]></description>
      <link>https://safeguard.sh/resources/blog/security-kpi-frameworks-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-kpi-frameworks-guide</guid>
      <pubDate>Fri, 08 Mar 2024 00:00:00 GMT</pubDate>
      <category>Security Management</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Fintech Software Supply Chain Regulatory Map]]></title>
      <description><![CDATA[A practical tour through the tangle of regulations, supervisory letters, and industry standards that now govern how fintech firms build, buy, and operate software.]]></description>
      <link>https://safeguard.sh/resources/blog/fintech-software-supply-chain-regulatory-map</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fintech-software-supply-chain-regulatory-map</guid>
      <pubDate>Tue, 05 Mar 2024 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Secrets Encryption Providers Reviewed]]></title>
      <description><![CDATA[etcd encryption at rest finally works out of the box. The question is which provider you use, and the trade-offs have sharpened in 2024.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-secrets-encryption-providers-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-secrets-encryption-providers-review</guid>
      <pubDate>Tue, 05 Mar 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Abandoned Package Takeover: When Maintainers Walk Away]]></title>
      <description><![CDATA[Abandoned packages are ticking time bombs in the supply chain. When maintainers disappear, attackers can take over package names and push malicious updates to millions of downstream projects.]]></description>
      <link>https://safeguard.sh/resources/blog/abandoned-package-takeover-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/abandoned-package-takeover-risks</guid>
      <pubDate>Tue, 05 Mar 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Capacitor and Ionic Hybrid App Security: A Practical Guide]]></title>
      <description><![CDATA[Capacitor-based hybrid apps blend web technologies with native device access. This combination creates a unique attack surface that requires specific security strategies.]]></description>
      <link>https://safeguard.sh/resources/blog/capacitor-ionic-hybrid-app-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/capacitor-ionic-hybrid-app-security</guid>
      <pubDate>Tue, 05 Mar 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Crates.io Security Audit Results: The State of Rust Package Security]]></title>
      <description><![CDATA[Security audits of the Rust crate ecosystem reveal patterns of unsafe code, build script risks, and supply chain vulnerabilities. Here is what the data shows.]]></description>
      <link>https://safeguard.sh/resources/blog/crates-io-security-audit-results</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/crates-io-security-audit-results</guid>
      <pubDate>Tue, 05 Mar 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Software Liability in 2024: The Shift From Caveat Emptor to Vendor Accountability]]></title>
      <description><![CDATA[Governments worldwide are moving to hold software vendors liable for security failures. Here is what the shifting liability landscape means for software producers and consumers.]]></description>
      <link>https://safeguard.sh/resources/blog/software-liability-shifting-landscape-2024</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-liability-shifting-landscape-2024</guid>
      <pubDate>Tue, 05 Mar 2024 09:00:00 GMT</pubDate>
      <category>Policy & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Argo CD GitOps Security Guide]]></title>
      <description><![CDATA[Securing Argo CD deployments with RBAC, SSO integration, secret management, and network policies for production Kubernetes clusters.]]></description>
      <link>https://safeguard.sh/resources/blog/argo-cd-gitops-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/argo-cd-gitops-security-guide</guid>
      <pubDate>Tue, 05 Mar 2024 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Securing Software Update Mechanisms]]></title>
      <description><![CDATA[Software updates are a double-edged sword: they deliver patches but also provide a trusted channel attackers can exploit. Securing the update mechanism itself is essential to supply chain integrity.]]></description>
      <link>https://safeguard.sh/resources/blog/software-update-mechanism-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-update-mechanism-security</guid>
      <pubDate>Tue, 05 Mar 2024 00:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Introducing Safeguard: Software Supply Chain Security, Done Right]]></title>
      <description><![CDATA[Today we are launching Safeguard, a platform purpose-built for managing the security of your software supply chain from SBOM generation to vulnerability response.]]></description>
      <link>https://safeguard.sh/resources/blog/introducing-safeguard-software-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/introducing-safeguard-software-supply-chain-security</guid>
      <pubDate>Fri, 01 Mar 2024 10:00:00 GMT</pubDate>
      <category>Company</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[AWS SAM Template Security Considerations]]></title>
      <description><![CDATA[SAM templates look simple and that is exactly the problem. The defaults are generous, the transforms are opaque, and the resulting stacks are often more privileged than anyone intended.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-sam-template-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-sam-template-security-considerations</guid>
      <pubDate>Wed, 28 Feb 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How to Set Up Sigstore in Your Build Pipeline]]></title>
      <description><![CDATA[Wire Sigstore into GitHub Actions end-to-end: OIDC identity, Cosign signing, Rekor transparency, and policy-controller enforcement — with working snippets.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-set-up-sigstore-in-your-build-pipeline</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-set-up-sigstore-in-your-build-pipeline</guid>
      <pubDate>Wed, 28 Feb 2024 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Lazarus Group Software Supply Chain Campaigns]]></title>
      <description><![CDATA[A field analyst's look at how North Korea's Lazarus Group has turned software supply chains into a strategic weapon, from 3CX to npm.]]></description>
      <link>https://safeguard.sh/resources/blog/lazarus-group-software-supply-chain-campaigns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lazarus-group-software-supply-chain-campaigns</guid>
      <pubDate>Wed, 28 Feb 2024 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[LockBit Takedown: Inside Operation Cronos]]></title>
      <description><![CDATA[Operation Cronos seized LockBit's leak site in February 2024. We unpack the NCA-led takedown, the decryptor release, and LockBit's rapid rebuild.]]></description>
      <link>https://safeguard.sh/resources/blog/lockbit-takedown-operation-cronos-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lockbit-takedown-operation-cronos-analysis</guid>
      <pubDate>Wed, 28 Feb 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Multi-Cloud Security Posture Management for Supply Chains]]></title>
      <description><![CDATA[Running workloads across AWS, Azure, and GCP multiplies your attack surface. This guide covers cloud security posture management with a supply chain lens.]]></description>
      <link>https://safeguard.sh/resources/blog/multi-cloud-security-posture-management</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/multi-cloud-security-posture-management</guid>
      <pubDate>Wed, 28 Feb 2024 11:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Building a Security Champions Program]]></title>
      <description><![CDATA[A step-by-step guide to launching a security champions program that scales your security team's influence across engineering without hiring a dozen new AppSec engineers.]]></description>
      <link>https://safeguard.sh/resources/blog/security-champions-program-building-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-champions-program-building-guide</guid>
      <pubDate>Wed, 28 Feb 2024 09:00:00 GMT</pubDate>
      <category>How-To Guide</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Building a Software Vendor Security Scorecard]]></title>
      <description><![CDATA[Not all vendors are equal when it comes to security. Here is how to build a scorecard that objectively evaluates vendor security practices and informs procurement decisions.]]></description>
      <link>https://safeguard.sh/resources/blog/software-vendor-security-scorecard</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-vendor-security-scorecard</guid>
      <pubDate>Wed, 28 Feb 2024 09:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Earthly Reproducible Builds and Security]]></title>
      <description><![CDATA[How Earthly's reproducible, containerized build system eliminates environment drift and strengthens build integrity for security-conscious teams.]]></description>
      <link>https://safeguard.sh/resources/blog/earthly-reproducible-builds-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/earthly-reproducible-builds-security</guid>
      <pubDate>Wed, 28 Feb 2024 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[CISA's Memory-Safe Languages Roadmap: What It Means for Software Development]]></title>
      <description><![CDATA[CISA publishes a roadmap urging the industry to transition to memory-safe programming languages, targeting the root cause of roughly 70% of critical vulnerabilities.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-memory-safe-languages-roadmap</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-memory-safe-languages-roadmap</guid>
      <pubDate>Mon, 26 Feb 2024 12:00:00 GMT</pubDate>
      <category>Compliance & Frameworks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NIST Cybersecurity Framework 2.0: What Changed and Why It Matters]]></title>
      <description><![CDATA[NIST CSF 2.0 introduces a new Govern function and expands supply chain risk management. Here's what security teams need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-cybersecurity-framework-2-0-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-cybersecurity-framework-2-0-guide</guid>
      <pubDate>Mon, 26 Feb 2024 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[NuGet Package Signing: Enterprise Rollout]]></title>
      <description><![CDATA[Rolling NuGet package signing enforcement across a large .NET estate is a policy and tooling problem, not a cryptography problem. Here is how it actually goes.]]></description>
      <link>https://safeguard.sh/resources/blog/nuget-package-signing-enterprise-rollout</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nuget-package-signing-enterprise-rollout</guid>
      <pubDate>Sun, 25 Feb 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Poetry and Python Supply Chain Security]]></title>
      <description><![CDATA[Poetry's lockfile is an asset. Its dependency resolver is a tradeoff. Here is how to run Poetry safely in a world of typosquats, dependency confusion, and unmaintained installers.]]></description>
      <link>https://safeguard.sh/resources/blog/python-poetry-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-poetry-supply-chain-security</guid>
      <pubDate>Thu, 22 Feb 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PDF Supply Chain Attack Vectors: When Documents Become Weapons]]></title>
      <description><![CDATA[PDFs are trusted by default in most organizations. That trust makes them a potent vector for supply chain attacks. Here is how the attacks work.]]></description>
      <link>https://safeguard.sh/resources/blog/pdf-supply-chain-attack-vectors</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pdf-supply-chain-attack-vectors</guid>
      <pubDate>Thu, 22 Feb 2024 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Change Healthcare Breach: The Worst Healthcare Data Breach in U.S. History]]></title>
      <description><![CDATA[In February 2024, a ransomware attack on Change Healthcare paralyzed the U.S. healthcare payment system for weeks and ultimately exposed the personal health data of over 100 million Americans, making it the largest healthcare data breach ever recorded.]]></description>
      <link>https://safeguard.sh/resources/blog/unitedhealth-change-healthcare-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/unitedhealth-change-healthcare-breach</guid>
      <pubDate>Wed, 21 Feb 2024 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Change Healthcare Ransomware Attack: The Breach That Disrupted American Healthcare]]></title>
      <description><![CDATA[The BlackCat/ALPHV ransomware attack on Change Healthcare caused the largest healthcare IT disruption in U.S. history, affecting pharmacies, hospitals, and insurance claims processing nationwide.]]></description>
      <link>https://safeguard.sh/resources/blog/change-healthcare-ransomware-attack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/change-healthcare-ransomware-attack</guid>
      <pubDate>Wed, 21 Feb 2024 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Operation Cronos: How Law Enforcement Dismantled LockBit Ransomware]]></title>
      <description><![CDATA[A coordinated international operation seized LockBit's infrastructure, arrested affiliates, and obtained decryption keys. But did it actually stop the world's most prolific ransomware gang?]]></description>
      <link>https://safeguard.sh/resources/blog/lockbit-ransomware-takedown-operation-cronos</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lockbit-ransomware-takedown-operation-cronos</guid>
      <pubDate>Tue, 20 Feb 2024 11:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Confusion in Private Registries: The Attack That Keeps Working]]></title>
      <description><![CDATA[Dependency confusion exploits the gap between public and private package registries. Despite widespread awareness, organizations keep falling for it.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-confusion-private-registries</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-confusion-private-registries</guid>
      <pubDate>Tue, 20 Feb 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Security Awareness Training That Developers Don't Hate]]></title>
      <description><![CDATA[Traditional security training is boring and ineffective. Here is how to build a training program developers actually engage with and learn from.]]></description>
      <link>https://safeguard.sh/resources/blog/security-awareness-training-developers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-awareness-training-developers</guid>
      <pubDate>Tue, 20 Feb 2024 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs for Microservices Architecture: Managing Complexity at Scale]]></title>
      <description><![CDATA[When your application is 50 services with 50 dependency trees, SBOM management stops being simple. Here's how to handle it.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-microservices-architecture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-microservices-architecture</guid>
      <pubDate>Tue, 20 Feb 2024 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Shopify's Supply Chain Security Program]]></title>
      <description><![CDATA[How Shopify built a supply chain security program that protects millions of merchants while maintaining the development velocity that e-commerce demands.]]></description>
      <link>https://safeguard.sh/resources/blog/shopify-supply-chain-security-program</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/shopify-supply-chain-security-program</guid>
      <pubDate>Tue, 20 Feb 2024 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Fortinet FortiOS CVE-2024-21762: Exploitation Patterns]]></title>
      <description><![CDATA[CVE-2024-21762 gave attackers pre-auth RCE on FortiGate SSL VPN. We trace the exploitation patterns, scanner behavior, and who got hit first.]]></description>
      <link>https://safeguard.sh/resources/blog/fortinet-fortios-cve-2024-21762-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fortinet-fortios-cve-2024-21762-exploitation</guid>
      <pubDate>Sun, 18 Feb 2024 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[gVisor Runtime Security Deep Dive]]></title>
      <description><![CDATA[gVisor intercepts syscalls in userspace and implements a minimal kernel in Go. It is a genuinely different approach, with genuinely different trade-offs.]]></description>
      <link>https://safeguard.sh/resources/blog/gvisor-runtime-security-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gvisor-runtime-security-deep-dive</guid>
      <pubDate>Sun, 18 Feb 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[NYDFS Cybersecurity Regulation: Software Security Requirements for Financial Firms]]></title>
      <description><![CDATA[New York's DFS cybersecurity regulation sets a high bar for financial institutions. Here's how the 2023 amendments affect software supply chain practices.]]></description>
      <link>https://safeguard.sh/resources/blog/nydfs-cybersecurity-regulation-software</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nydfs-cybersecurity-regulation-software</guid>
      <pubDate>Sun, 18 Feb 2024 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Incident Notification Laws: A Global Overview]]></title>
      <description><![CDATA[Governments worldwide are mandating supply chain incident disclosure. Here is what organizations need to know about notification requirements across major jurisdictions.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-incident-notification-laws</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-incident-notification-laws</guid>
      <pubDate>Sun, 18 Feb 2024 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Semgrep vs CodeQL: Static Analysis for Security Teams]]></title>
      <description><![CDATA[A deep comparison of Semgrep and CodeQL for static application security testing, covering rule writing, performance, language support, and practical deployment considerations.]]></description>
      <link>https://safeguard.sh/resources/blog/semgrep-codeql-sast-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/semgrep-codeql-sast-comparison</guid>
      <pubDate>Sun, 18 Feb 2024 00:00:00 GMT</pubDate>
      <category>Tool Comparisons</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[XML External Entity (XXE) Prevention: Disabling the Features That Attack You]]></title>
      <description><![CDATA[XXE attacks exploit XML parser features that most applications never need. Here is how to disable them across every major language and framework.]]></description>
      <link>https://safeguard.sh/resources/blog/xml-external-entity-xxe-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xml-external-entity-xxe-prevention</guid>
      <pubDate>Sun, 18 Feb 2024 00:00:00 GMT</pubDate>
      <category>Code Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[How to Enforce Cosign Signatures in Kubernetes Admission]]></title>
      <description><![CDATA[A hands-on tutorial for blocking unsigned container images at the Kubernetes admission layer using Cosign, Sigstore policy-controller, and keyless verification.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-enforce-cosign-signatures-in-kubernetes-admission</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-enforce-cosign-signatures-in-kubernetes-admission</guid>
      <pubDate>Thu, 15 Feb 2024 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[.NET NuGet Package Security]]></title>
      <description><![CDATA[Securing your .NET supply chain with NuGet package signing, lock files, and vulnerability scanning.]]></description>
      <link>https://safeguard.sh/resources/blog/dotnet-nuget-package-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dotnet-nuget-package-security</guid>
      <pubDate>Thu, 15 Feb 2024 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Media and Entertainment Software Supply Chain Security]]></title>
      <description><![CDATA[Streaming platforms, studios, and media companies depend on complex software stacks. Here's how the entertainment industry should approach supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/media-entertainment-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/media-entertainment-software-supply-chain</guid>
      <pubDate>Thu, 15 Feb 2024 10:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Why We Built Safeguard]]></title>
      <description><![CDATA[The software supply chain is broken. We started Safeguard because existing tools treated SBOM as a checkbox exercise instead of a security discipline.]]></description>
      <link>https://safeguard.sh/resources/blog/why-we-built-safeguard</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/why-we-built-safeguard</guid>
      <pubDate>Thu, 15 Feb 2024 10:00:00 GMT</pubDate>
      <category>Company</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Azure Managed Identities and the Supply Chain]]></title>
      <description><![CDATA[Managed identities are the credential primitive that fixes most supply chain risk in Azure — but only if you use them the way the service actually intends.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-managed-identities-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-managed-identities-supply-chain</guid>
      <pubDate>Wed, 14 Feb 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Bank of America Breach via Infosys McCamish Exposes 57,000 Customers]]></title>
      <description><![CDATA[In February 2024, Bank of America disclosed that a ransomware attack on its service provider Infosys McCamish Systems had compromised the personal and financial data of over 57,000 customers, highlighting the cascading risk of vendor supply chain attacks.]]></description>
      <link>https://safeguard.sh/resources/blog/bank-of-america-infosys-mccamish-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bank-of-america-infosys-mccamish-breach</guid>
      <pubDate>Mon, 12 Feb 2024 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Multi-Stage Docker Builds: The Security Implications Nobody Talks About]]></title>
      <description><![CDATA[Multi-stage builds reduce image size, but they also introduce security considerations around build secrets, layer caching, and dependency leakage.]]></description>
      <link>https://safeguard.sh/resources/blog/multi-stage-docker-builds-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/multi-stage-docker-builds-security</guid>
      <pubDate>Mon, 12 Feb 2024 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Service Worker Security Risks: The Persistent Threat in Your Browser]]></title>
      <description><![CDATA[Service workers intercept network requests, cache content, and run in the background. When compromised, they become a persistent foothold in the browser.]]></description>
      <link>https://safeguard.sh/resources/blog/service-worker-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/service-worker-security-risks</guid>
      <pubDate>Mon, 12 Feb 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Compliance as Code: Implementation Guide for Security Teams]]></title>
      <description><![CDATA[Compliance as code transforms audit requirements into automated checks. This guide covers frameworks, tooling, and practical implementation for security teams.]]></description>
      <link>https://safeguard.sh/resources/blog/compliance-as-code-implementation-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/compliance-as-code-implementation-guide</guid>
      <pubDate>Mon, 12 Feb 2024 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[go mod tidy: The Security Implications]]></title>
      <description><![CDATA[Running go mod tidy feels like harmless housekeeping, but the command can silently pull new code, update checksums, and reshape your dependency graph in ways that have real security consequences.]]></description>
      <link>https://safeguard.sh/resources/blog/go-mod-tidy-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-mod-tidy-security-implications</guid>
      <pubDate>Sat, 10 Feb 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[npm Package Visibility Audit Techniques]]></title>
      <description><![CDATA[Public when it should have been private. Private when it should have been archived. The state of npm package visibility across an organization is almost always worse than the team thinks.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-package-visibility-audit-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-package-visibility-audit-techniques</guid>
      <pubDate>Sat, 10 Feb 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs for AI/ML Models: Why Machine Learning Needs a Bill of Materials]]></title>
      <description><![CDATA[As AI models become critical infrastructure, the need for transparency about their components, training data, and dependencies grows urgent. Emerging standards are beginning to address this gap.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-ai-ml-models-emerging-standards</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-ai-ml-models-emerging-standards</guid>
      <pubDate>Sat, 10 Feb 2024 09:00:00 GMT</pubDate>
      <category>SBOM & Standards</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Remix Framework Security Deep Dive]]></title>
      <description><![CDATA[Remix's server-first architecture and loader/action primitives make for a distinctive security model. The framework encourages good patterns, but the places where it leaves choices to the developer are where I find the interesting bugs.]]></description>
      <link>https://safeguard.sh/resources/blog/remix-framework-security-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/remix-framework-security-deep-dive</guid>
      <pubDate>Thu, 08 Feb 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Building vs Buying Security Tools: Making the Right Call]]></title>
      <description><![CDATA[Every security team faces the build-vs-buy decision. Here is a framework for deciding when to build custom tools and when to buy off the shelf.]]></description>
      <link>https://safeguard.sh/resources/blog/building-vs-buying-security-tools</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/building-vs-buying-security-tools</guid>
      <pubDate>Thu, 08 Feb 2024 10:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Government Contractor SBOM Compliance: Meeting Federal Requirements]]></title>
      <description><![CDATA[Federal agencies are mandating SBOMs from their software suppliers. If you sell software to the government, here's what compliance looks like.]]></description>
      <link>https://safeguard.sh/resources/blog/government-contractor-sbom-compliance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/government-contractor-sbom-compliance</guid>
      <pubDate>Thu, 08 Feb 2024 08:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Green Software and Security: When Sustainability Meets Supply Chain Risk]]></title>
      <description><![CDATA[The push for sustainable software is changing how we build and deploy applications. Security teams need to understand where green initiatives create new risks.]]></description>
      <link>https://safeguard.sh/resources/blog/green-software-security-sustainability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/green-software-security-sustainability</guid>
      <pubDate>Thu, 08 Feb 2024 08:00:00 GMT</pubDate>
      <category>Industry Trends</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Updates in Air-Gapped Environments: Security Without Connectivity]]></title>
      <description><![CDATA[Air-gapped environments protect critical infrastructure by eliminating network connectivity. But software still needs updates. Bridging this gap without introducing the risks you isolated against is the challenge.]]></description>
      <link>https://safeguard.sh/resources/blog/air-gapped-environment-software-updates</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/air-gapped-environment-software-updates</guid>
      <pubDate>Thu, 08 Feb 2024 00:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[The Annual Vendor Security Review Cadence]]></title>
      <description><![CDATA[A complete timeline and workflow for running the annual vendor security review cycle, staffed sustainably, with clear deliverables and audit-ready evidence.]]></description>
      <link>https://safeguard.sh/resources/blog/annual-vendor-security-review-cadence</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/annual-vendor-security-review-cadence</guid>
      <pubDate>Tue, 06 Feb 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Privilege Escalation in Web Applications: Attacks and Defenses]]></title>
      <description><![CDATA[Privilege escalation vulnerabilities let attackers elevate their access level within an application. This guide covers both vertical and horizontal escalation techniques, real-world patterns, and concrete defenses.]]></description>
      <link>https://safeguard.sh/resources/blog/privilege-escalation-web-applications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/privilege-escalation-web-applications</guid>
      <pubDate>Mon, 05 Feb 2024 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Secure Development Environment Setup: A Practical Guide]]></title>
      <description><![CDATA[Setting up a secure development environment involves more than installing an IDE. From OS hardening to credential management, here is a comprehensive checklist for security-conscious teams.]]></description>
      <link>https://safeguard.sh/resources/blog/secure-development-environment-setup</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/secure-development-environment-setup</guid>
      <pubDate>Mon, 05 Feb 2024 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[South Korea's Cybersecurity Regulations and Software Supply Chain Requirements]]></title>
      <description><![CDATA[South Korea is strengthening cybersecurity regulations with new supply chain security frameworks. Here's the landscape for software vendors.]]></description>
      <link>https://safeguard.sh/resources/blog/south-korea-cybersecurity-regulations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/south-korea-cybersecurity-regulations</guid>
      <pubDate>Mon, 05 Feb 2024 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AnyDesk Production Systems Compromised: Code Signing Certificates Stolen]]></title>
      <description><![CDATA[AnyDesk confirmed a breach of their production systems in late January 2024, forcing revocation of code signing certificates and a mandatory password reset for all users.]]></description>
      <link>https://safeguard.sh/resources/blog/anydesk-production-systems-compromised</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/anydesk-production-systems-compromised</guid>
      <pubDate>Fri, 02 Feb 2024 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Cloudflare's Thanksgiving 2023 Breach: How Okta Credentials Led to a Nation-State Intrusion]]></title>
      <description><![CDATA[Cloudflare disclosed that a nation-state actor used credentials stolen from the October 2023 Okta breach to access their Atlassian systems. Their transparent post-mortem set a new standard.]]></description>
      <link>https://safeguard.sh/resources/blog/cloudflare-thanksgiving-2023-breach-okta</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloudflare-thanksgiving-2023-breach-okta</guid>
      <pubDate>Thu, 01 Feb 2024 09:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Secure Boot UEFI and Software Supply Chain Links]]></title>
      <description><![CDATA[How UEFI Secure Boot, shim, and Microsoft third-party UEFI CA connect to software supply chain risk in OS and firmware update pipelines.]]></description>
      <link>https://safeguard.sh/resources/blog/secure-boot-uefi-software-supply-chain-links</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/secure-boot-uefi-software-supply-chain-links</guid>
      <pubDate>Tue, 30 Jan 2024 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs for Defense Contractors: Aligning with CMMC and DoD Requirements]]></title>
      <description><![CDATA[Defense contractors face unique SBOM challenges. This guide covers CMMC alignment, DFARS clauses, and practical steps to meet DoD software supply chain requirements.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-defense-contractors-cmmc</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-defense-contractors-cmmc</guid>
      <pubDate>Sun, 28 Jan 2024 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[YAML Deserialization Attacks and How to Prevent Them]]></title>
      <description><![CDATA[YAML looks innocent but its deserialization features have led to remote code execution in countless applications. Here is why and how to stay safe.]]></description>
      <link>https://safeguard.sh/resources/blog/yaml-deserialization-attacks-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/yaml-deserialization-attacks-prevention</guid>
      <pubDate>Sun, 28 Jan 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Vite and Turbopack: Security Considerations for Next-Gen Build Tools]]></title>
      <description><![CDATA[Vite and Turbopack represent the next generation of JavaScript build tools. Their architectures introduce new security considerations alongside their performance improvements.]]></description>
      <link>https://safeguard.sh/resources/blog/vite-turbopack-build-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vite-turbopack-build-security</guid>
      <pubDate>Sun, 28 Jan 2024 09:00:00 GMT</pubDate>
      <category>AppSec</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM for Fintech Startups: Compliance and Security from Day One]]></title>
      <description><![CDATA[Fintech startups face intense regulatory scrutiny from the start. SBOMs are not just good practice — they are becoming a regulatory expectation that investors and partners demand.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-fintech-startups</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-fintech-startups</guid>
      <pubDate>Sun, 28 Jan 2024 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Midnight Blizzard and the Microsoft Email Breach]]></title>
      <description><![CDATA[Russia's SVR-linked Midnight Blizzard sat inside Microsoft's corporate email for weeks. Here is what the January 2024 disclosure revealed about identity supply chains.]]></description>
      <link>https://safeguard.sh/resources/blog/midnight-blizzard-microsoft-email-breach-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/midnight-blizzard-microsoft-email-breach-analysis</guid>
      <pubDate>Thu, 25 Jan 2024 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Auditing AI-Generated Code: A Practical Security Guide]]></title>
      <description><![CDATA[AI code generation tools are producing millions of lines of code daily. Here is a practical framework for auditing AI-generated code for security vulnerabilities and supply chain risks.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-code-generation-security-audit-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-code-generation-security-audit-guide</guid>
      <pubDate>Thu, 25 Jan 2024 09:00:00 GMT</pubDate>
      <category>AppSec</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[SBOM API Integration Patterns for Development Teams]]></title>
      <description><![CDATA[SBOMs locked in files are static inventory. SBOMs exposed through APIs become live infrastructure. Here's how to build the integration layer.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-api-integration-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-api-integration-patterns</guid>
      <pubDate>Thu, 25 Jan 2024 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Trello API Scraping Exposes 15 Million User Accounts]]></title>
      <description><![CDATA[In January 2024, a threat actor used an insecure Trello API endpoint to scrape and correlate email addresses with Trello account data for over 15 million users, then posted the dataset on a hacking forum.]]></description>
      <link>https://safeguard.sh/resources/blog/trello-15-million-accounts-exposed</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/trello-15-million-accounts-exposed</guid>
      <pubDate>Mon, 22 Jan 2024 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Netflix's Open-Source Security Approach]]></title>
      <description><![CDATA[How Netflix manages security across hundreds of open-source projects and thousands of internal dependencies while maintaining the velocity that streaming demands.]]></description>
      <link>https://safeguard.sh/resources/blog/netflix-open-source-security-approach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/netflix-open-source-security-approach</guid>
      <pubDate>Mon, 22 Jan 2024 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[npm audit vs pnpm audit vs yarn audit]]></title>
      <description><![CDATA[Three audit tools, three philosophies, three blind spots. A ground-level comparison of how npm, pnpm, and yarn surface vulnerabilities, and where each one leaves you exposed.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-audit-vs-pnpm-audit-vs-yarn-audit</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-audit-vs-pnpm-audit-vs-yarn-audit</guid>
      <pubDate>Sat, 20 Jan 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Manufacturing OT Software Supply Chain: Securing the Factory Floor]]></title>
      <description><![CDATA[Manufacturing OT systems depend on software supply chains that most security teams don't monitor. Here's how to extend supply chain security to the factory floor.]]></description>
      <link>https://safeguard.sh/resources/blog/manufacturing-ot-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/manufacturing-ot-software-supply-chain</guid>
      <pubDate>Sat, 20 Jan 2024 10:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[React Application Security Guide]]></title>
      <description><![CDATA[Securing React applications from XSS, dependency vulnerabilities, and common frontend attack patterns.]]></description>
      <link>https://safeguard.sh/resources/blog/react-application-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/react-application-security-guide</guid>
      <pubDate>Sat, 20 Jan 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Microsoft Breached by Midnight Blizzard: Russian Hackers Read Executive Emails]]></title>
      <description><![CDATA[In January 2024, Microsoft disclosed that the Russian state-sponsored group Midnight Blizzard had been reading emails of senior executives and security team members since November 2023, using a password spray attack against a legacy test account.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-midnight-blizzard-email-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-midnight-blizzard-email-breach</guid>
      <pubDate>Fri, 19 Jan 2024 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Midnight Blizzard Breaches Microsoft: What the Exchange Online Attack Means for Everyone]]></title>
      <description><![CDATA[Russian state actors compromised Microsoft executive email accounts through a password spray attack on a legacy test tenant. The breach exposed how identity misconfigurations cascade.]]></description>
      <link>https://safeguard.sh/resources/blog/midnight-blizzard-microsoft-exchange-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/midnight-blizzard-microsoft-exchange-breach</guid>
      <pubDate>Fri, 19 Jan 2024 10:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Veracode SCA: Mature Application Security Meets Dependency Scanning]]></title>
      <description><![CDATA[An overview of Veracode's SCA capabilities within their broader application security platform, covering vulnerability prioritization, agent-based scanning, and enterprise features.]]></description>
      <link>https://safeguard.sh/resources/blog/veracode-sca-platform-overview</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/veracode-sca-platform-overview</guid>
      <pubDate>Thu, 18 Jan 2024 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[How to Detect Typosquatting in Package Installs]]></title>
      <description><![CDATA[Build a pre-install guard that catches typosquatted npm, PyPI, and RubyGems dependencies using Levenshtein distance, download-count heuristics, and registry APIs.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-detect-typosquatting-in-package-installs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-detect-typosquatting-in-package-installs</guid>
      <pubDate>Mon, 15 Jan 2024 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Software Component Lifecycle Management]]></title>
      <description><![CDATA[Components do not stay secure forever. This guide covers managing the full lifecycle of software dependencies -- from adoption through deprecation -- with a focus on security and operational continuity.]]></description>
      <link>https://safeguard.sh/resources/blog/software-component-lifecycle-management</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-component-lifecycle-management</guid>
      <pubDate>Mon, 15 Jan 2024 11:00:00 GMT</pubDate>
      <category>Lifecycle Management</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[How to Security Audit an Open Source Project Before Adoption]]></title>
      <description><![CDATA[Adopting an open source dependency is a trust decision. This guide provides a structured methodology for evaluating the security posture of open source projects before adding them to your supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-project-security-audit-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-project-security-audit-guide</guid>
      <pubDate>Mon, 15 Jan 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Bun Runtime Security Considerations: Speed vs. Safety Trade-offs]]></title>
      <description><![CDATA[Bun prioritizes performance over Node.js compatibility. But some of those performance choices have security implications worth understanding.]]></description>
      <link>https://safeguard.sh/resources/blog/bun-runtime-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bun-runtime-security-considerations</guid>
      <pubDate>Sun, 14 Jan 2024 10:00:00 GMT</pubDate>
      <category>Secure Development</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Akira Ransomware: Exploiting VPN Vulnerabilities for Supply Chain Entry]]></title>
      <description><![CDATA[Akira ransomware systematically exploited Cisco VPN vulnerabilities as its primary entry vector, targeting organizations through the network infrastructure they trusted most.]]></description>
      <link>https://safeguard.sh/resources/blog/akira-ransomware-supply-chain-entry</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/akira-ransomware-supply-chain-entry</guid>
      <pubDate>Fri, 12 Jan 2024 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AWS ECR Image Scanning: A Deep Dive Into What It Catches and What It Misses]]></title>
      <description><![CDATA[ECR offers both basic and enhanced scanning. The difference between them determines whether your container security is real or performative.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-ecr-image-scanning-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-ecr-image-scanning-deep-dive</guid>
      <pubDate>Fri, 12 Jan 2024 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Express and Node.js Security Hardening]]></title>
      <description><![CDATA[Practical security hardening for Express.js applications covering middleware, input validation, and production deployment.]]></description>
      <link>https://safeguard.sh/resources/blog/express-nodejs-security-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/express-nodejs-security-hardening</guid>
      <pubDate>Fri, 12 Jan 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Platform Engineering and Security: Building Guardrails, Not Gates]]></title>
      <description><![CDATA[Platform engineering teams are becoming the stewards of developer experience. Here's how to make supply chain security a built-in capability, not a bolt-on burden.]]></description>
      <link>https://safeguard.sh/resources/blog/platform-engineering-security-integration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/platform-engineering-security-integration</guid>
      <pubDate>Fri, 12 Jan 2024 10:00:00 GMT</pubDate>
      <category>Industry Trends</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability SLA Compliance Tracking That Actually Works]]></title>
      <description><![CDATA[Most organizations define vulnerability SLAs and then fail to meet them. The problem is not motivation. It is measurement and process.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-sla-compliance-tracking</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-sla-compliance-tracking</guid>
      <pubDate>Fri, 12 Jan 2024 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Ivanti Connect Secure Zero-Day: CVE-2024-21887 and CVE-2023-46805 Exploited in the Wild]]></title>
      <description><![CDATA[Two chained zero-days in Ivanti Connect Secure VPN appliances gave attackers unauthenticated remote code execution. Here's what happened and why perimeter devices remain a favorite target.]]></description>
      <link>https://safeguard.sh/resources/blog/ivanti-connect-secure-cve-2024-21887-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ivanti-connect-secure-cve-2024-21887-zero-day</guid>
      <pubDate>Wed, 10 Jan 2024 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Ansible Galaxy Security Risks: The Infrastructure Supply Chain You Forgot About]]></title>
      <description><![CDATA[Ansible Galaxy roles and collections execute with root privileges on your infrastructure. Most teams apply zero security scrutiny to them.]]></description>
      <link>https://safeguard.sh/resources/blog/ansible-galaxy-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ansible-galaxy-security-risks</guid>
      <pubDate>Mon, 08 Jan 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Gradle Plugin Security Risks: The Code That Runs Before Your Code]]></title>
      <description><![CDATA[Gradle plugins execute during your build with full access to your environment. Most teams never audit them. Here is why that is dangerous.]]></description>
      <link>https://safeguard.sh/resources/blog/gradle-plugin-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gradle-plugin-security-risks</guid>
      <pubDate>Mon, 08 Jan 2024 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[npm Registry Governance and the Security of node_modules]]></title>
      <description><![CDATA[The npm registry serves billions of downloads per week. Its governance decisions directly impact the security of every Node.js application on the planet.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-registry-governance-and-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-registry-governance-and-security</guid>
      <pubDate>Mon, 08 Jan 2024 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[HTTP Request Smuggling: A Practical Guide]]></title>
      <description><![CDATA[HTTP request smuggling exploits disagreements between frontend and backend servers about where one request ends and the next begins. This guide covers CL.TE, TE.CL, and TE.TE variants with detection and defense strategies.]]></description>
      <link>https://safeguard.sh/resources/blog/http-request-smuggling-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/http-request-smuggling-guide</guid>
      <pubDate>Fri, 05 Jan 2024 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[IAST vs RASP: Runtime Protection Approaches Compared]]></title>
      <description><![CDATA[Interactive Application Security Testing and Runtime Application Self-Protection both operate at runtime, but they serve different purposes. Here is how they compare and when to use each.]]></description>
      <link>https://safeguard.sh/resources/blog/iast-rasp-runtime-protection-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/iast-rasp-runtime-protection-comparison</guid>
      <pubDate>Fri, 05 Jan 2024 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[AI Code Review for Security: How Effective Is It Really?]]></title>
      <description><![CDATA[AI-powered code review tools promise to catch vulnerabilities faster than humans. We tested the claims against reality.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-code-review-security-effectiveness</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-code-review-security-effectiveness</guid>
      <pubDate>Fri, 05 Jan 2024 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How to Write a Security Advisory That Actually Helps]]></title>
      <description><![CDATA[Most security advisories are either too vague to be actionable or too detailed to be safe. Here is how to write advisories that help defenders without enabling attackers.]]></description>
      <link>https://safeguard.sh/resources/blog/security-advisory-writing-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-advisory-writing-guide</guid>
      <pubDate>Thu, 28 Dec 2023 09:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Apache OFBiz CVE-2023-51467: Authentication Bypass in Enterprise Resource Planning]]></title>
      <description><![CDATA[CVE-2023-51467 bypassed a previous patch for an authentication flaw in Apache OFBiz, granting unauthenticated access to ERP functionality. A patch bypass that exposed critical business data.]]></description>
      <link>https://safeguard.sh/resources/blog/apache-ofbiz-cve-2023-51467-auth-bypass</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apache-ofbiz-cve-2023-51467-auth-bypass</guid>
      <pubDate>Tue, 26 Dec 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[npm Team Access Model Hardening]]></title>
      <description><![CDATA[Npm's team-based permissions are more expressive than most organizations use. A walkthrough of the access model and the configurations that actually reduce blast radius.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-team-access-model-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-team-access-model-hardening</guid>
      <pubDate>Fri, 22 Dec 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security in 2023: Year in Review]]></title>
      <description><![CDATA[From the MOVEit mass exploitation to AI model risks, 2023 proved that supply chain attacks are accelerating in both sophistication and scale. Here's what we learned.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-security-2023-year-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-security-2023-year-review</guid>
      <pubDate>Wed, 20 Dec 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Disclosure Policy Template]]></title>
      <description><![CDATA[A practical template for creating a vulnerability disclosure policy, with guidance on safe harbor provisions, response timelines, and researcher relationships.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-disclosure-policy-template</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-disclosure-policy-template</guid>
      <pubDate>Wed, 20 Dec 2023 00:00:00 GMT</pubDate>
      <category>Organizational Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[VF Corporation Ransomware Attack Disrupts Vans, North Face, and Timberland]]></title>
      <description><![CDATA[In December 2023, VF Corporation, parent company of Vans, The North Face, and Timberland, suffered a ransomware attack that disrupted order fulfillment and exposed personal data of 35.5 million customers during the critical holiday shopping season.]]></description>
      <link>https://safeguard.sh/resources/blog/vans-vf-corporation-ransomware</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vans-vf-corporation-ransomware</guid>
      <pubDate>Mon, 18 Dec 2023 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Xfinity Breach via Citrix Bleed Exposes 35.9 Million Customers]]></title>
      <description><![CDATA[In December 2023, Comcast's Xfinity division disclosed that attackers exploiting the Citrix Bleed vulnerability had accessed personal data of 35.9 million customers, including usernames, hashed passwords, and partial Social Security numbers.]]></description>
      <link>https://safeguard.sh/resources/blog/xfinity-citrix-bleed-35-million</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xfinity-citrix-bleed-35-million</guid>
      <pubDate>Mon, 18 Dec 2023 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Building a Security Automation Playbook Library for Supply Chain Defense]]></title>
      <description><![CDATA[Security automation playbooks codify response procedures into executable workflows. A well-designed playbook library turns supply chain incidents from fire drills into routine operations.]]></description>
      <link>https://safeguard.sh/resources/blog/security-automation-playbook-library</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-automation-playbook-library</guid>
      <pubDate>Mon, 18 Dec 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Red Team Supply Chain Attack Simulation]]></title>
      <description><![CDATA[How red teams can simulate real-world supply chain attacks to test organizational defenses—from dependency confusion to build pipeline compromise.]]></description>
      <link>https://safeguard.sh/resources/blog/red-team-supply-chain-attack-simulation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/red-team-supply-chain-attack-simulation</guid>
      <pubDate>Mon, 18 Dec 2023 00:00:00 GMT</pubDate>
      <category>Offensive Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[SEC Cyber Disclosure Rules: What Public Companies Must Do Now]]></title>
      <description><![CDATA[The SEC's new cybersecurity disclosure rules require public companies to report material incidents within four days. Here's the operational impact.]]></description>
      <link>https://safeguard.sh/resources/blog/sec-cyber-disclosure-rules-impact</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sec-cyber-disclosure-rules-impact</guid>
      <pubDate>Fri, 15 Dec 2023 11:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Autonomous Security Remediation: The Promise and Peril of Self-Healing Software]]></title>
      <description><![CDATA[Automated vulnerability patching sounds ideal until you consider what happens when the automation gets it wrong. Here's a realistic look at autonomous remediation.]]></description>
      <link>https://safeguard.sh/resources/blog/autonomous-security-remediation-future</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/autonomous-security-remediation-future</guid>
      <pubDate>Fri, 15 Dec 2023 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[JFrog Artifactory Hardening Guide]]></title>
      <description><![CDATA[Artifactory is the most common artifact repository in enterprise. It is also a default-permissive system where misconfigurations compound. A concrete hardening guide.]]></description>
      <link>https://safeguard.sh/resources/blog/jfrog-artifactory-hardening-guide-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jfrog-artifactory-hardening-guide-2023</guid>
      <pubDate>Thu, 14 Dec 2023 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[API Gateway Security Patterns That Actually Work]]></title>
      <description><![CDATA[API gateways sit between the internet and your services. Getting the security patterns right here multiplies your defense across every API behind them.]]></description>
      <link>https://safeguard.sh/resources/blog/api-gateway-security-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/api-gateway-security-patterns</guid>
      <pubDate>Tue, 12 Dec 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Puppet Forge Supply Chain Security: Trusting Your Configuration Management]]></title>
      <description><![CDATA[Puppet modules from the Forge run with root-level access on your servers. The supply chain security of these modules deserves the same scrutiny as any dependency.]]></description>
      <link>https://safeguard.sh/resources/blog/puppet-forge-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/puppet-forge-supply-chain-security</guid>
      <pubDate>Tue, 12 Dec 2023 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Container Runtime Security Comparison: runc, gVisor, Kata, and Firecracker]]></title>
      <description><![CDATA[Your container runtime determines the strength of your isolation boundary. Here is an honest comparison of runc, gVisor, Kata Containers, and Firecracker from a security perspective.]]></description>
      <link>https://safeguard.sh/resources/blog/container-runtime-comparison-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-runtime-comparison-security</guid>
      <pubDate>Tue, 12 Dec 2023 00:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Education Sector Software Security: Protecting Students and Data]]></title>
      <description><![CDATA[Schools and universities rely on hundreds of software applications with limited security staff. Here's how education institutions can manage software supply chain risk.]]></description>
      <link>https://safeguard.sh/resources/blog/education-sector-software-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/education-sector-software-security</guid>
      <pubDate>Sun, 10 Dec 2023 11:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Log4j Two Years Later: Are We Actually Safer?]]></title>
      <description><![CDATA[Two years after Log4Shell shook the internet, many organizations still have vulnerable Log4j instances. The vulnerability changed how we think about supply chain security—but did it change how we act?]]></description>
      <link>https://safeguard.sh/resources/blog/log4j-two-years-later-are-we-safer</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/log4j-two-years-later-are-we-safer</guid>
      <pubDate>Sun, 10 Dec 2023 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Post-Install Hooks Across Package Managers: A Comparative Security Analysis]]></title>
      <description><![CDATA[Every package ecosystem handles install-time code execution differently. Some are permissive, some restrictive, and the differences matter for supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/post-install-hooks-across-package-managers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/post-install-hooks-across-package-managers</guid>
      <pubDate>Sun, 10 Dec 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Norton Healthcare Ransomware Breach Exposes 2.5 Million Patient Records]]></title>
      <description><![CDATA[In December 2023, Norton Healthcare disclosed that a May ransomware attack by the ALPHV/BlackCat group had compromised personal and medical data of 2.5 million patients, revealing the devastating impact of ransomware on healthcare.]]></description>
      <link>https://safeguard.sh/resources/blog/norton-healthcare-ransomware-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/norton-healthcare-ransomware-breach</guid>
      <pubDate>Fri, 08 Dec 2023 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[WAF Bypass Techniques and What They Mean for Supply Chain Security]]></title>
      <description><![CDATA[Web Application Firewalls are a critical defense layer, but they are routinely bypassed. Understanding bypass techniques helps you build defense in depth rather than relying on a single control.]]></description>
      <link>https://safeguard.sh/resources/blog/web-application-firewall-bypass-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/web-application-firewall-bypass-techniques</guid>
      <pubDate>Fri, 08 Dec 2023 14:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Firmware Analysis and Reverse Engineering for Security Teams]]></title>
      <description><![CDATA[Firmware is the forgotten attack surface. Here are the techniques security teams use to uncover hidden vulnerabilities in embedded software.]]></description>
      <link>https://safeguard.sh/resources/blog/firmware-analysis-reverse-engineering-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/firmware-analysis-reverse-engineering-security</guid>
      <pubDate>Fri, 08 Dec 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Multi-Cloud Container Security: Building a Unified Strategy]]></title>
      <description><![CDATA[How to maintain consistent container security across AWS, Azure, and GCP without drowning in tool sprawl and fragmented visibility.]]></description>
      <link>https://safeguard.sh/resources/blog/multi-cloud-container-security-strategy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/multi-cloud-container-security-strategy</guid>
      <pubDate>Fri, 08 Dec 2023 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Security Observability and Telemetry: Seeing What Matters]]></title>
      <description><![CDATA[Traditional security monitoring drowns you in alerts. Security observability flips the model — providing context-rich telemetry that makes threats visible without the noise.]]></description>
      <link>https://safeguard.sh/resources/blog/security-observability-telemetry-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-observability-telemetry-guide</guid>
      <pubDate>Fri, 08 Dec 2023 00:00:00 GMT</pubDate>
      <category>Security Operations</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Apache Struts CVE-2023-50164: Critical File Upload RCE Echoes Equifax-Era Nightmares]]></title>
      <description><![CDATA[A critical path traversal vulnerability in Apache Struts allowed RCE through file upload manipulation. The disclosure triggered flashbacks to the 2017 Equifax breach caused by a similar Struts flaw.]]></description>
      <link>https://safeguard.sh/resources/blog/apache-struts-cve-2023-50164-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apache-struts-cve-2023-50164-rce</guid>
      <pubDate>Thu, 07 Dec 2023 14:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[OpenShift Security Context Constraints: A Guide]]></title>
      <description><![CDATA[SCCs predate Pod Security Admission by a decade and are more powerful. That power is also why OpenShift newcomers find them confusing.]]></description>
      <link>https://safeguard.sh/resources/blog/openshift-security-context-constraints-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openshift-security-context-constraints-guide</guid>
      <pubDate>Wed, 06 Dec 2023 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[How to Verify a PyPI Package Before Install]]></title>
      <description><![CDATA[A practical pre-install verification workflow for PyPI packages covering sigstore attestations, maintainer checks, and sdist auditing.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-verify-pypi-package-before-install</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-verify-pypi-package-before-install</guid>
      <pubDate>Tue, 05 Dec 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Deserialization Attacks in Java and Python]]></title>
      <description><![CDATA[Insecure deserialization turns data parsing into code execution. This guide covers deserialization attacks in Java and Python, the gadget chain concept, and practical defenses for both ecosystems.]]></description>
      <link>https://safeguard.sh/resources/blog/deserialization-attacks-java-python</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/deserialization-attacks-java-python</guid>
      <pubDate>Tue, 05 Dec 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Purple Team Exercises for Supply Chain Security]]></title>
      <description><![CDATA[Purple team exercises combine offensive and defensive perspectives to test supply chain defenses. Here is how to structure exercises that improve both detection capabilities and attack understanding.]]></description>
      <link>https://safeguard.sh/resources/blog/purple-team-supply-chain-exercises</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/purple-team-supply-chain-exercises</guid>
      <pubDate>Tue, 05 Dec 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Managing Security Debt: A Practical Guide]]></title>
      <description><![CDATA[Security debt is inevitable, but it does not have to be unmanageable. Learn how to quantify, prioritize, and systematically pay down your organization's security debt.]]></description>
      <link>https://safeguard.sh/resources/blog/managing-security-debt-practical-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/managing-security-debt-practical-guide</guid>
      <pubDate>Tue, 05 Dec 2023 09:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Dependency Health Metrics That Actually Matter]]></title>
      <description><![CDATA[Star counts and download numbers tell you popularity, not health. The metrics that predict dependency risk are harder to measure and more important to track.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-dependency-health-metrics</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-dependency-health-metrics</guid>
      <pubDate>Tue, 05 Dec 2023 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Monorepo Security: Dependency Management at Scale]]></title>
      <description><![CDATA[Monorepos centralize code but create unique security challenges. Learn how to manage shared dependencies, enforce security policies, and maintain SBOMs across a monorepo architecture.]]></description>
      <link>https://safeguard.sh/resources/blog/monorepo-security-dependency-management</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/monorepo-security-dependency-management</guid>
      <pubDate>Sun, 03 Dec 2023 11:00:00 GMT</pubDate>
      <category>Architecture</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Federal SBOM Mandate: Compliance Deadlines and What They Mean for Vendors]]></title>
      <description><![CDATA[Federal agencies are tightening SBOM requirements for software suppliers. Here's what vendors need to know about compliance deadlines, attestation requirements, and practical implementation.]]></description>
      <link>https://safeguard.sh/resources/blog/federal-sbom-mandate-compliance-deadline</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/federal-sbom-mandate-compliance-deadline</guid>
      <pubDate>Fri, 01 Dec 2023 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[npm Scripts Sandboxing Techniques]]></title>
      <description><![CDATA[Postinstall scripts have been the supply-chain attacker's favorite tool for a decade. Here are the sandboxing techniques that actually work, ranked from cheap to serious.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-scripts-sandboxing-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-scripts-sandboxing-techniques</guid>
      <pubDate>Thu, 30 Nov 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SOX IT Controls and Software Supply Chain]]></title>
      <description><![CDATA[SOX ITGCs are being rewritten around open-source software and build integrity as PCAOB and SEC scrutiny extends ICFR into the developer toolchain for the first time.]]></description>
      <link>https://safeguard.sh/resources/blog/sox-it-controls-software-supply-chain-intersection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sox-it-controls-software-supply-chain-intersection</guid>
      <pubDate>Sun, 26 Nov 2023 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Dollar Tree Third-Party Breach Impacts Nearly 2 Million Employees]]></title>
      <description><![CDATA[In November 2023, Dollar Tree disclosed that a breach at its third-party service provider Zeroed-In Technologies exposed the personal data of nearly 2 million current and former employees, highlighting the persistent risk of third-party supply chain compromises.]]></description>
      <link>https://safeguard.sh/resources/blog/dollar-tree-third-party-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dollar-tree-third-party-breach</guid>
      <pubDate>Wed, 22 Nov 2023 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[How to Audit npm Postinstall Scripts Safely]]></title>
      <description><![CDATA[Inspect every lifecycle script in your node_modules tree, disable dangerous ones by default, and catch malicious postinstall hooks before they execute.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-audit-npm-postinstall-scripts-safely</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-audit-npm-postinstall-scripts-safely</guid>
      <pubDate>Wed, 22 Nov 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Chainguard Images: The Zero-CVE Container Base Image Revolution]]></title>
      <description><![CDATA[Chainguard ships container images with zero known CVEs. That sounds like marketing until you understand how they build them. Here is the technical reality behind the claim.]]></description>
      <link>https://safeguard.sh/resources/blog/chainguard-images-minimal-containers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chainguard-images-minimal-containers</guid>
      <pubDate>Wed, 22 Nov 2023 00:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[AI Model Supply Chain Risks: Hugging Face and the New Attack Surface]]></title>
      <description><![CDATA[As organizations download pre-trained models from Hugging Face and other model hubs, the AI supply chain introduces risks that traditional software security tools don't address.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-model-supply-chain-hugging-face-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-model-supply-chain-hugging-face-risks</guid>
      <pubDate>Mon, 20 Nov 2023 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Security Considerations When Migrating from Monolith to Microservices]]></title>
      <description><![CDATA[Decomposing a monolith into microservices changes the attack surface fundamentally. The security model that worked for the monolith will not work for the distributed system.]]></description>
      <link>https://safeguard.sh/resources/blog/monolith-to-microservices-security-migration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/monolith-to-microservices-security-migration</guid>
      <pubDate>Sat, 18 Nov 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Legacy Software and Supply Chain Risks]]></title>
      <description><![CDATA[Legacy systems are supply chain time bombs—running outdated dependencies, unsupported frameworks, and unmaintained libraries. Here's how to manage the risk.]]></description>
      <link>https://safeguard.sh/resources/blog/legacy-software-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/legacy-software-supply-chain-risks</guid>
      <pubDate>Sat, 18 Nov 2023 00:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Express.js Security Middleware: An Audit]]></title>
      <description><![CDATA[Express remains the default Node.js framework at most shops, and its middleware ecosystem is a thirteen-year accumulation of packages, some abandoned, some indispensable. This is a pragmatic audit of what belongs in a 2023 Express stack.]]></description>
      <link>https://safeguard.sh/resources/blog/express-js-security-middleware-audit</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/express-js-security-middleware-audit</guid>
      <pubDate>Wed, 15 Nov 2023 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Healthcare Software Security: HIPAA, SBOMs, and Patient Safety]]></title>
      <description><![CDATA[Medical devices and healthcare IT systems depend on software with hidden vulnerabilities. Here's how SBOMs and supply chain security intersect with HIPAA.]]></description>
      <link>https://safeguard.sh/resources/blog/healthcare-software-security-hipaa-sbom</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/healthcare-software-security-hipaa-sbom</guid>
      <pubDate>Wed, 15 Nov 2023 11:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MongoDB Atlas Breach: Customer Metadata Exposed in Corporate Systems Attack]]></title>
      <description><![CDATA[MongoDB disclosed unauthorized access to its corporate systems in December 2023, exposing customer metadata and contact information while Atlas cluster data remained secure.]]></description>
      <link>https://safeguard.sh/resources/blog/mongodb-atlas-breach-customer-data</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mongodb-atlas-breach-customer-data</guid>
      <pubDate>Wed, 15 Nov 2023 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[API Key Rotation Automation: A Practical Implementation Guide]]></title>
      <description><![CDATA[Manual key rotation does not happen. Automated rotation does. Here is how to implement zero-downtime API key rotation for the services and credentials that matter most.]]></description>
      <link>https://safeguard.sh/resources/blog/api-key-rotation-automation-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/api-key-rotation-automation-guide</guid>
      <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
      <category>Security Operations</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[SonarQube Security Scanning: Code Quality Meets Application Security]]></title>
      <description><![CDATA[A review of SonarQube's security scanning capabilities, examining how its code quality heritage shapes its approach to vulnerability detection and taint analysis.]]></description>
      <link>https://safeguard.sh/resources/blog/sonarqube-security-scanning-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sonarqube-security-scanning-review</guid>
      <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Apache Web Server Hardening Guide for Production Environments]]></title>
      <description><![CDATA[Apache httpd still serves millions of websites. Its default configuration exposes information, accepts weak TLS, and enables features you probably do not need.]]></description>
      <link>https://safeguard.sh/resources/blog/apache-web-server-hardening-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apache-web-server-hardening-guide</guid>
      <pubDate>Sun, 12 Nov 2023 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Snap Store and Flatpak Security Models Compared]]></title>
      <description><![CDATA[Universal Linux packaging formats promise sandboxed applications. Their security models differ significantly, and neither delivers the isolation most users assume.]]></description>
      <link>https://safeguard.sh/resources/blog/snap-store-flatpak-security-models</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/snap-store-flatpak-security-models</guid>
      <pubDate>Sun, 12 Nov 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Travis CI Security Best Practices]]></title>
      <description><![CDATA[Security hardening for Travis CI pipelines covering secret management, build isolation, and migration considerations for teams still on the platform.]]></description>
      <link>https://safeguard.sh/resources/blog/travis-ci-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/travis-ci-security-best-practices</guid>
      <pubDate>Sun, 12 Nov 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Boeing Hit by LockBit Ransomware: 43GB of Sensitive Data Leaked]]></title>
      <description><![CDATA[In November 2023, the LockBit ransomware gang published 43 gigabytes of Boeing's internal data after the aerospace giant refused to pay ransom, exposing the persistent vulnerability of manufacturing supply chains to ransomware.]]></description>
      <link>https://safeguard.sh/resources/blog/boeing-lockbit-ransomware-data-leak</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/boeing-lockbit-ransomware-data-leak</guid>
      <pubDate>Fri, 10 Nov 2023 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Rust Cargo Dependency Security Guide]]></title>
      <description><![CDATA[How to secure your Rust supply chain with Cargo.lock, crate auditing, and build script controls.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-cargo-dependency-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-cargo-dependency-security-guide</guid>
      <pubDate>Fri, 10 Nov 2023 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Singapore's Cybersecurity Act and Software Supply Chain Obligations]]></title>
      <description><![CDATA[Singapore's regulatory approach to cybersecurity is maturing fast, with supply chain security becoming a central pillar. Here's what's changing.]]></description>
      <link>https://safeguard.sh/resources/blog/singapore-cybersecurity-act-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/singapore-cybersecurity-act-supply-chain</guid>
      <pubDate>Fri, 10 Nov 2023 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[govulncheck in Production Integration]]></title>
      <description><![CDATA[govulncheck is the best vulnerability scanner the Go ecosystem has ever had, but turning it from a demo into a production gate takes more than adding a CI step.]]></description>
      <link>https://safeguard.sh/resources/blog/govulncheck-production-integration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/govulncheck-production-integration</guid>
      <pubDate>Wed, 08 Nov 2023 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Apache ActiveMQ CVE-2023-46604: Ransomware Groups Exploit Critical RCE]]></title>
      <description><![CDATA[A critical remote code execution flaw in Apache ActiveMQ was rapidly weaponized by ransomware operators, with exploitation beginning before many organizations could patch.]]></description>
      <link>https://safeguard.sh/resources/blog/apache-activemq-cve-2023-46604-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apache-activemq-cve-2023-46604-rce</guid>
      <pubDate>Wed, 08 Nov 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Citrix Bleed CVE-2023-4966: Session Token Theft That Bypassed Every Authentication Control]]></title>
      <description><![CDATA[Citrix Bleed allowed attackers to steal session tokens from NetScaler ADC, bypassing MFA and all authentication controls. LockBit ransomware used it to devastating effect.]]></description>
      <link>https://safeguard.sh/resources/blog/citrix-bleed-cve-2023-4966-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/citrix-bleed-cve-2023-4966-exploitation</guid>
      <pubDate>Wed, 08 Nov 2023 10:00:00 GMT</pubDate>
      <category>Zero-Day Exploits</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Java Module System Security Features: What JPMS Actually Delivers]]></title>
      <description><![CDATA[The Java Platform Module System promised stronger encapsulation and security boundaries. Here is what it actually delivers and where the gaps remain.]]></description>
      <link>https://safeguard.sh/resources/blog/java-module-system-security-features</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/java-module-system-security-features</guid>
      <pubDate>Wed, 08 Nov 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[The LLM Supply Chain: Risks Hiding in Foundation Models]]></title>
      <description><![CDATA[Large language models have their own supply chains: training data, fine-tuning datasets, model weights, and serving infrastructure. Each layer introduces risk.]]></description>
      <link>https://safeguard.sh/resources/blog/large-language-model-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/large-language-model-supply-chain-risks</guid>
      <pubDate>Wed, 08 Nov 2023 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[OAuth Token Security Throughout the Lifecycle]]></title>
      <description><![CDATA[OAuth tokens grant access to APIs, services, and user data. Their security across creation, storage, use, and revocation determines your application risk posture.]]></description>
      <link>https://safeguard.sh/resources/blog/oauth-token-security-lifecycle</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/oauth-token-security-lifecycle</guid>
      <pubDate>Wed, 08 Nov 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[CI/CD Credential Theft Prevention]]></title>
      <description><![CDATA[CI/CD pipelines are treasure troves of secrets -- cloud credentials, API keys, signing certificates. Preventing credential theft from build environments is critical to supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/ci-cd-credential-theft-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ci-cd-credential-theft-prevention</guid>
      <pubDate>Wed, 08 Nov 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Deno's Permission-Based Security Model: What It Gets Right and Where It Falls Short]]></title>
      <description><![CDATA[Deno was built with security as a first-class concern, requiring explicit permissions for file, network, and environment access. Here is an honest assessment of what that model delivers in practice.]]></description>
      <link>https://safeguard.sh/resources/blog/deno-runtime-security-model-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/deno-runtime-security-model-analysis</guid>
      <pubDate>Wed, 08 Nov 2023 00:00:00 GMT</pubDate>
      <category>Developer Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Executive Order 14028 at the Two-Year Mark]]></title>
      <description><![CDATA[Two years after Executive Order 14028 on federal cybersecurity, the operational impact is clearer. What actually changed, what stalled, and what is coming in year three.]]></description>
      <link>https://safeguard.sh/resources/blog/executive-order-14028-year-two-checkpoint</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/executive-order-14028-year-two-checkpoint</guid>
      <pubDate>Sun, 05 Nov 2023 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs in the Automotive Industry: Navigating Software-Defined Vehicles]]></title>
      <description><![CDATA[Modern vehicles contain over 100 million lines of code. The automotive industry is waking up to software supply chain security, and SBOMs are central to the response.]]></description>
      <link>https://safeguard.sh/resources/blog/software-bill-of-materials-automotive-industry</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-bill-of-materials-automotive-industry</guid>
      <pubDate>Sun, 05 Nov 2023 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[CMMC 2.0 and Software Supply Chain Security: A Practical Guide]]></title>
      <description><![CDATA[CMMC 2.0 is reshaping defense contracting requirements. Here's how software supply chain security maps to the new maturity model.]]></description>
      <link>https://safeguard.sh/resources/blog/cmmc-2-0-software-supply-chain-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cmmc-2-0-software-supply-chain-guide</guid>
      <pubDate>Sun, 05 Nov 2023 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Container Escape Techniques in 2023: What's Changed and What Hasn't]]></title>
      <description><![CDATA[Container escapes remain a real threat in multi-tenant environments. A look at the latest techniques, CVEs, and defenses as container security matures in 2023.]]></description>
      <link>https://safeguard.sh/resources/blog/container-escape-techniques-2023-update</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-escape-techniques-2023-update</guid>
      <pubDate>Sun, 05 Nov 2023 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Deno Security Model Advantages: Runtime Permissions Done Right]]></title>
      <description><![CDATA[Deno requires explicit permission grants for file, network, and environment access. This capability-based model changes the supply chain risk equation.]]></description>
      <link>https://safeguard.sh/resources/blog/deno-security-model-advantages</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/deno-security-model-advantages</guid>
      <pubDate>Sun, 05 Nov 2023 10:00:00 GMT</pubDate>
      <category>Secure Development</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Hijacking Prevention: A Comprehensive Guide]]></title>
      <description><![CDATA[Dependency hijacking encompasses multiple attack techniques that redirect dependency resolution to attacker-controlled packages. This guide covers all major hijacking vectors and their countermeasures.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-hijacking-prevention-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-hijacking-prevention-guide</guid>
      <pubDate>Sun, 05 Nov 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Pulumi and Crossplane Security: IaC Beyond Terraform]]></title>
      <description><![CDATA[Security considerations for Pulumi and Crossplane as infrastructure-as-code alternatives, including unique risks and hardening strategies.]]></description>
      <link>https://safeguard.sh/resources/blog/pulumi-crossplane-iac-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pulumi-crossplane-iac-security</guid>
      <pubDate>Sun, 05 Nov 2023 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[React Native Security Considerations for Mobile Supply Chains]]></title>
      <description><![CDATA[React Native introduces unique security challenges at the intersection of JavaScript and native mobile code. Understanding these risks is essential for securing cross-platform mobile applications.]]></description>
      <link>https://safeguard.sh/resources/blog/react-native-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/react-native-security-considerations</guid>
      <pubDate>Sun, 05 Nov 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[RubyGems Yanked Gems: Security Risks of Removed Ruby Packages]]></title>
      <description><![CDATA[When a Ruby gem is yanked from RubyGems.org, it creates security risks for projects that depended on it. Understanding the yanking mechanism is critical for Ruby supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/rubygems-yanked-gems-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rubygems-yanked-gems-security</guid>
      <pubDate>Sun, 05 Nov 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[API Security Testing Against the OWASP API Top 10: A Hands-On Guide]]></title>
      <description><![CDATA[APIs are now the primary attack surface for most applications. Here is how to test for the OWASP API Security Top 10 risks systematically.]]></description>
      <link>https://safeguard.sh/resources/blog/api-security-testing-owasp-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/api-security-testing-owasp-guide</guid>
      <pubDate>Sun, 05 Nov 2023 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Cloudflare's Supply Chain Security Model]]></title>
      <description><![CDATA[How Cloudflare secures the software supply chain for infrastructure that sits between the internet and millions of websites, with lessons on Rust adoption and edge computing security.]]></description>
      <link>https://safeguard.sh/resources/blog/cloudflare-supply-chain-security-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloudflare-supply-chain-security-model</guid>
      <pubDate>Sun, 05 Nov 2023 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Wiz Cloud Security Platform: Agentless Done at Scale]]></title>
      <description><![CDATA[An overview of Wiz's cloud security platform, covering its agentless architecture, graph-based risk analysis, and how it changed expectations for cloud security tooling.]]></description>
      <link>https://safeguard.sh/resources/blog/wiz-cloud-security-platform-overview</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/wiz-cloud-security-platform-overview</guid>
      <pubDate>Sun, 05 Nov 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Mr. Cooper Mortgage Breach Exposes 14.7 Million Customers]]></title>
      <description><![CDATA[In November 2023, mortgage giant Mr. Cooper disclosed a cyberattack that compromised the personal and financial data of 14.7 million current and former customers, making it one of the largest financial services breaches of the year.]]></description>
      <link>https://safeguard.sh/resources/blog/mr-cooper-mortgage-data-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mr-cooper-mortgage-data-breach</guid>
      <pubDate>Wed, 01 Nov 2023 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[CISA's Secure by Default: Shifting Responsibility to Software Manufacturers]]></title>
      <description><![CDATA[CISA's Secure by Design guidance pushes software vendors to ship secure defaults and take ownership of customer security outcomes, fundamentally changing the security responsibility model.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-secure-by-default-guidance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-secure-by-default-guidance</guid>
      <pubDate>Wed, 01 Nov 2023 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PyPI 2FA Enrollment: Enterprise Rollout]]></title>
      <description><![CDATA[PyPI's 2FA mandate isn't just a personal-account concern anymore — enterprises publishing Python libraries have real rollout work to do. A playbook from the front lines.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-2fa-enrollment-enterprise-rollout</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-2fa-enrollment-enterprise-rollout</guid>
      <pubDate>Sat, 28 Oct 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Building a Software Supply Chain Risk Register]]></title>
      <description><![CDATA[A risk register is the backbone of supply chain risk management. Here is a practical template for identifying, scoring, tracking, and mitigating software supply chain risks.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-risk-register-template</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-risk-register-template</guid>
      <pubDate>Sat, 28 Oct 2023 09:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Dagger CI/CD Security Benefits]]></title>
      <description><![CDATA[How Dagger's containerized pipeline model improves CI/CD security with hermetic builds, portability, and reduced platform dependency.]]></description>
      <link>https://safeguard.sh/resources/blog/dagger-ci-cd-security-benefits</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dagger-ci-cd-security-benefits</guid>
      <pubDate>Sat, 28 Oct 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[F5 BIG-IP CVE-2023-46747: Authentication Bypass Puts Network Infrastructure at Risk]]></title>
      <description><![CDATA[A critical authentication bypass in F5 BIG-IP allowed unauthenticated attackers to gain administrative access. The vulnerability affected the management interface of devices protecting enterprise networks.]]></description>
      <link>https://safeguard.sh/resources/blog/f5-big-ip-cve-2023-46747-authentication-bypass</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/f5-big-ip-cve-2023-46747-authentication-bypass</guid>
      <pubDate>Fri, 27 Oct 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[A History of Browser Sandbox Escapes and What They Teach Us]]></title>
      <description><![CDATA[Browser sandboxes are the last line of defense against web-based attacks. When they fail, everything is exposed. Here is what the major escapes reveal.]]></description>
      <link>https://safeguard.sh/resources/blog/browser-sandbox-escape-history</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/browser-sandbox-escape-history</guid>
      <pubDate>Wed, 25 Oct 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Building a DevSecOps Culture: Beyond Tools and into Teams]]></title>
      <description><![CDATA[DevSecOps is a culture shift, not a tooling decision. Practical strategies for building security into development teams without creating friction or resentment.]]></description>
      <link>https://safeguard.sh/resources/blog/devsecops-culture-building-security-teams</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/devsecops-culture-building-security-teams</guid>
      <pubDate>Wed, 25 Oct 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Confidential Computing: A New Trust Model for Software Supply Chains]]></title>
      <description><![CDATA[Confidential computing protects data in use through hardware-based enclaves. It could fundamentally change how we think about supply chain trust.]]></description>
      <link>https://safeguard.sh/resources/blog/confidential-computing-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/confidential-computing-supply-chain</guid>
      <pubDate>Sun, 22 Oct 2023 11:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Southeast Asia's Software Supply Chain Security Gap]]></title>
      <description><![CDATA[Southeast Asia's booming tech sector is building fast but securing slowly. Supply chain attacks targeting the region are increasing, and most organizations lack basic visibility into their dependencies.]]></description>
      <link>https://safeguard.sh/resources/blog/southeast-asia-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/southeast-asia-supply-chain-security</guid>
      <pubDate>Sun, 22 Oct 2023 00:00:00 GMT</pubDate>
      <category>Regional Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Trivy vs Grype: Container Scanning Head-to-Head]]></title>
      <description><![CDATA[Compare Trivy and Grype on vulnerability database sources, scan speed, OS coverage, SBOM integration, and CI ergonomics to pick the right open source container scanner.]]></description>
      <link>https://safeguard.sh/resources/blog/trivy-vs-grype-container-scanning-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/trivy-vs-grype-container-scanning-2023</guid>
      <pubDate>Fri, 20 Oct 2023 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Okta's Support System Breach: Identity Provider Under Fire Again]]></title>
      <description><![CDATA[Okta disclosed that attackers used stolen credentials to access its customer support system, downloading HAR files containing session tokens for multiple customers.]]></description>
      <link>https://safeguard.sh/resources/blog/okta-support-system-breach-october-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/okta-support-system-breach-october-2023</guid>
      <pubDate>Fri, 20 Oct 2023 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[CISO Quarterly Reporting Template: What the Board Actually Needs to See]]></title>
      <description><![CDATA[Most CISO board reports contain too many technical details and not enough business context. Here is a reporting template that communicates security posture in terms boards understand.]]></description>
      <link>https://safeguard.sh/resources/blog/ciso-quarterly-reporting-template</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ciso-quarterly-reporting-template</guid>
      <pubDate>Fri, 20 Oct 2023 09:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[RSA Conference 2023 Supply Chain Track: Field Notes]]></title>
      <description><![CDATA[Five takeaways from the supply chain sessions at RSA Conference 2023, from SBOM adoption skepticism to attestation tooling and federal procurement pressure.]]></description>
      <link>https://safeguard.sh/resources/blog/rsa-conference-2023-supply-chain-track-notes</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rsa-conference-2023-supply-chain-track-notes</guid>
      <pubDate>Wed, 18 Oct 2023 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs for Embedded Systems: Firmware Transparency]]></title>
      <description><![CDATA[Embedded devices run for decades and rarely get patched. SBOMs bring transparency to firmware that the IoT industry desperately needs.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-embedded-systems</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-embedded-systems</guid>
      <pubDate>Wed, 18 Oct 2023 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Uber's Security Transformation Post-Breach]]></title>
      <description><![CDATA[How Uber rebuilt its security program after the 2016 data breach and the 2022 Lapsus$ compromise, with hard-won lessons about security culture and supply chain controls.]]></description>
      <link>https://safeguard.sh/resources/blog/uber-security-transformation-post-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/uber-security-transformation-post-breach</guid>
      <pubDate>Wed, 18 Oct 2023 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Cisco IOS XE CVE-2023-20198: Tens of Thousands of Devices Implanted]]></title>
      <description><![CDATA[A critical zero-day in Cisco IOS XE's web UI allowed unauthenticated attackers to create admin accounts and deploy implants on over 40,000 devices worldwide.]]></description>
      <link>https://safeguard.sh/resources/blog/cisco-ios-xe-cve-2023-20198-implant</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisco-ios-xe-cve-2023-20198-implant</guid>
      <pubDate>Mon, 16 Oct 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cisco IOS XE CVE-2023-20198: The Zero-Day That Compromised Tens of Thousands of Network Devices]]></title>
      <description><![CDATA[CVE-2023-20198 in Cisco IOS XE allowed unauthenticated attackers to create admin accounts on network devices. Over 40,000 devices were compromised before Cisco shipped a fix.]]></description>
      <link>https://safeguard.sh/resources/blog/cisco-ios-xe-webui-cve-2023-20198-implant</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisco-ios-xe-webui-cve-2023-20198-implant</guid>
      <pubDate>Mon, 16 Oct 2023 10:00:00 GMT</pubDate>
      <category>Zero-Day Exploits</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[TypeScript Security Best Practices]]></title>
      <description><![CDATA[How TypeScript's type system helps catch security bugs at compile time, and what it cannot protect you from.]]></description>
      <link>https://safeguard.sh/resources/blog/typescript-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/typescript-security-best-practices</guid>
      <pubDate>Sun, 15 Oct 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[How to Enable Dependency Review on GitHub PRs]]></title>
      <description><![CDATA[A step-by-step tutorial for turning on GitHub Dependency Review, enforcing license and severity policies, and getting fast feedback on every pull request.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-enable-github-dependency-review-on-prs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-enable-github-dependency-review-on-prs</guid>
      <pubDate>Thu, 12 Oct 2023 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Progressive Web App Security: The Risks Hiding in the Browser]]></title>
      <description><![CDATA[PWAs blur the line between websites and applications. Their security model is browser-based, which introduces different risks than native applications.]]></description>
      <link>https://safeguard.sh/resources/blog/progressive-web-app-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/progressive-web-app-security-guide</guid>
      <pubDate>Thu, 12 Oct 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Scratch vs Distroless: Choosing the Right Minimal Container Image]]></title>
      <description><![CDATA[Both scratch and distroless promise minimal attack surface. The right choice depends on your runtime, your debugging needs, and your tolerance for complexity.]]></description>
      <link>https://safeguard.sh/resources/blog/scratch-vs-distroless-minimal-images</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/scratch-vs-distroless-minimal-images</guid>
      <pubDate>Thu, 12 Oct 2023 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Incident Response Tabletop Exercises: A Practical Guide for Supply Chain Scenarios]]></title>
      <description><![CDATA[Your incident response plan is untested until people have walked through it under pressure. Here is how to design and run tabletop exercises that actually prepare your team for supply chain compromises.]]></description>
      <link>https://safeguard.sh/resources/blog/incident-response-tabletop-exercises-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/incident-response-tabletop-exercises-guide</guid>
      <pubDate>Thu, 12 Oct 2023 00:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Insecure Deserialization: Why Untrusted Data Should Never Become Objects]]></title>
      <description><![CDATA[Deserialization vulnerabilities turn data into code execution. Here is how they work, which languages are most affected, and how to defend against them.]]></description>
      <link>https://safeguard.sh/resources/blog/insecure-deserialization-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/insecure-deserialization-prevention</guid>
      <pubDate>Thu, 12 Oct 2023 00:00:00 GMT</pubDate>
      <category>Code Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[curl CVE-2023-38545: The Worst curl Vulnerability in Years]]></title>
      <description><![CDATA[A heap buffer overflow in curl's SOCKS5 proxy handshake earned a severity rating of HIGH from curl's creator Daniel Stenberg, who called it the worst curl flaw in a long time.]]></description>
      <link>https://safeguard.sh/resources/blog/curl-cve-2023-38545-heap-buffer-overflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/curl-cve-2023-38545-heap-buffer-overflow</guid>
      <pubDate>Wed, 11 Oct 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[HTTP/2 Rapid Reset: The Largest DDoS Attacks in Internet History]]></title>
      <description><![CDATA[CVE-2023-44487 exploits a design flaw in HTTP/2 to amplify DDoS attacks, enabling record-breaking attacks peaking at 398 million requests per second.]]></description>
      <link>https://safeguard.sh/resources/blog/http2-rapid-reset-cve-2023-44487-ddos</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/http2-rapid-reset-cve-2023-44487-ddos</guid>
      <pubDate>Tue, 10 Oct 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Cloud-Native Application Protection: Beyond the Buzzword]]></title>
      <description><![CDATA[CNAPP promises unified cloud security. Here is what it actually delivers, where it falls short, and how to evaluate platforms honestly.]]></description>
      <link>https://safeguard.sh/resources/blog/cloud-native-application-protection-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloud-native-application-protection-guide</guid>
      <pubDate>Sun, 08 Oct 2023 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Open Source vs Commercial SCA Tools: An Honest Comparison]]></title>
      <description><![CDATA[Free SCA tools have gotten remarkably good. Commercial tools still offer advantages. Here is when each makes sense for your organization.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-vs-commercial-sca</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-vs-commercial-sca</guid>
      <pubDate>Sun, 08 Oct 2023 10:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Scattered Spider: The Social Engineering Group That Outmaneuvered Enterprise Security]]></title>
      <description><![CDATA[Scattered Spider combined aggressive social engineering with deep knowledge of enterprise IT to breach MGM Resorts, Caesars Entertainment, and dozens of other organizations.]]></description>
      <link>https://safeguard.sh/resources/blog/scattered-spider-social-engineering-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/scattered-spider-social-engineering-attacks</guid>
      <pubDate>Sun, 08 Oct 2023 10:00:00 GMT</pubDate>
      <category>Threat Actors</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Package Registry Mirroring: Security Benefits and Hidden Risks]]></title>
      <description><![CDATA[Mirroring npm, PyPI, or Maven Central locally reduces dependency on external infrastructure. But mirrors introduce their own security considerations that most teams overlook.]]></description>
      <link>https://safeguard.sh/resources/blog/package-registry-mirroring-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/package-registry-mirroring-security</guid>
      <pubDate>Sun, 08 Oct 2023 00:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Python setuptools Security Considerations]]></title>
      <description><![CDATA[setuptools is the default Python packaging backend and its security properties matter for anyone who builds, installs, or runs Python code. Here is what to watch.]]></description>
      <link>https://safeguard.sh/resources/blog/python-setuptools-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-setuptools-security-considerations</guid>
      <pubDate>Thu, 05 Oct 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Authorization Vulnerabilities: Prevention and Best Practices]]></title>
      <description><![CDATA[Authorization flaws let authenticated users access resources and perform actions beyond their intended permissions. Learn the most common authorization vulnerabilities and how to build robust access control systems.]]></description>
      <link>https://safeguard.sh/resources/blog/authorization-vulnerabilities-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/authorization-vulnerabilities-prevention</guid>
      <pubDate>Thu, 05 Oct 2023 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[OpenSSF Scorecard v5: Raising the Bar for Open Source Security]]></title>
      <description><![CDATA[The latest release of OpenSSF Scorecard introduces new checks and improved accuracy, helping organizations make data-driven decisions about open source dependency risk.]]></description>
      <link>https://safeguard.sh/resources/blog/openssf-scorecard-v5-release</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openssf-scorecard-v5-release</guid>
      <pubDate>Thu, 05 Oct 2023 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Zero Trust for Developer Workstations: Rethinking Endpoint Security]]></title>
      <description><![CDATA[Developer workstations have elevated access to source code, build systems, and deployment pipelines. Zero Trust principles applied to these endpoints significantly reduce supply chain attack surface.]]></description>
      <link>https://safeguard.sh/resources/blog/zero-trust-developer-workstations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zero-trust-developer-workstations</guid>
      <pubDate>Thu, 05 Oct 2023 10:00:00 GMT</pubDate>
      <category>Network Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[When Observability Meets Security: The Convergence That Changes Everything]]></title>
      <description><![CDATA[Observability and security have operated in silos for too long. Their convergence creates capabilities that neither could achieve alone.]]></description>
      <link>https://safeguard.sh/resources/blog/observability-security-convergence</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/observability-security-convergence</guid>
      <pubDate>Thu, 05 Oct 2023 09:00:00 GMT</pubDate>
      <category>Industry Trends</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[JetBrains TeamCity CVE-2023-42793: When Your Build Server Becomes the Attack Vector]]></title>
      <description><![CDATA[A critical authentication bypass in TeamCity allowed unauthenticated attackers to gain admin access to CI/CD servers. State-sponsored groups exploited it to compromise software supply chains.]]></description>
      <link>https://safeguard.sh/resources/blog/jetbrains-teamcity-cve-2023-42793-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jetbrains-teamcity-cve-2023-42793-exploitation</guid>
      <pubDate>Tue, 03 Oct 2023 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[OWASP Top 10 for LLM Applications: A First Look]]></title>
      <description><![CDATA[OWASP published its first Top 10 for LLM Applications on August 1, 2023. Here is what it covers, where it overreaches, and how to use it on real systems.]]></description>
      <link>https://safeguard.sh/resources/blog/owasp-top-10-for-llm-applications-first-look</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/owasp-top-10-for-llm-applications-first-look</guid>
      <pubDate>Thu, 28 Sep 2023 12:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[JSON Parsing Library Vulnerabilities You Should Know About]]></title>
      <description><![CDATA[JSON is the lingua franca of APIs, but the libraries that parse it have had serious security issues. Here is what to watch for in your stack.]]></description>
      <link>https://safeguard.sh/resources/blog/json-parsing-library-vulnerabilities</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/json-parsing-library-vulnerabilities</guid>
      <pubDate>Thu, 28 Sep 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Webpack vs Rollup vs esbuild: A Security Comparison]]></title>
      <description><![CDATA[Choosing a bundler is usually about speed and features. Here is how Webpack, Rollup, and esbuild compare on the dimension that matters most for supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/webpack-rollup-esbuild-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/webpack-rollup-esbuild-security</guid>
      <pubDate>Thu, 28 Sep 2023 09:00:00 GMT</pubDate>
      <category>AppSec</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Checkmarx SCA: Application Security from a SAST Pioneer]]></title>
      <description><![CDATA[A review of Checkmarx SCA covering its integration with the broader Checkmarx AST platform, vulnerability detection, and exploitability analysis capabilities.]]></description>
      <link>https://safeguard.sh/resources/blog/checkmarx-sca-platform-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/checkmarx-sca-platform-review</guid>
      <pubDate>Thu, 28 Sep 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Progress WS_FTP CVE-2023-40044: Another File Transfer Platform Falls to Pre-Auth RCE]]></title>
      <description><![CDATA[A critical deserialization vulnerability in Progress WS_FTP Server allowed unauthenticated RCE. Coming after MOVEit, it proved that file transfer platforms remain a systemic weak point.]]></description>
      <link>https://safeguard.sh/resources/blog/progress-ws-ftp-cve-2023-40044-critical</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/progress-ws-ftp-cve-2023-40044-critical</guid>
      <pubDate>Wed, 27 Sep 2023 14:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Designing a Vulnerability Triage Workflow That Works]]></title>
      <description><![CDATA[Most vulnerability triage processes are broken. Here is how to design a workflow that reduces noise, routes issues to the right owners, and actually gets things fixed.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-triage-workflow-design</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-triage-workflow-design</guid>
      <pubDate>Mon, 25 Sep 2023 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Securing LLM Applications: The OWASP Top 10 for Large Language Models]]></title>
      <description><![CDATA[OWASP released its Top 10 for LLM Applications in August 2023, providing the first standardized framework for understanding and mitigating risks in AI-powered software.]]></description>
      <link>https://safeguard.sh/resources/blog/securing-llm-applications-owasp-top-10</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/securing-llm-applications-owasp-top-10</guid>
      <pubDate>Mon, 25 Sep 2023 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Storage and Distribution Infrastructure]]></title>
      <description><![CDATA[Generating SBOMs is solved. Storing, versioning, and distributing them at scale is the next engineering challenge.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-storage-distribution-infrastructure</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-storage-distribution-infrastructure</guid>
      <pubDate>Mon, 25 Sep 2023 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[AI Hallucinations Meet Package Confusion: A New Class of Supply Chain Attack]]></title>
      <description><![CDATA[When LLMs hallucinate package names that don't exist, attackers can register them. This supply chain attack vector is already being exploited in the wild.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-hallucination-package-confusion-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-hallucination-package-confusion-attacks</guid>
      <pubDate>Wed, 20 Sep 2023 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Spring Boot Security and Dependency Management]]></title>
      <description><![CDATA[Securing Spring Boot applications with dependency management BOMs, vulnerability scanning, and hardened configurations.]]></description>
      <link>https://safeguard.sh/resources/blog/spring-boot-security-dependency-management</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spring-boot-security-dependency-management</guid>
      <pubDate>Wed, 20 Sep 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM for the Gaming Industry: Why Game Studios Need Software Transparency]]></title>
      <description><![CDATA[Game studios ship millions of lines of code with complex dependency chains across engines, middleware, and third-party SDKs. SBOMs are not just a compliance tool — they are an operational necessity.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-gaming-industry</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-gaming-industry</guid>
      <pubDate>Wed, 20 Sep 2023 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Tooling Landscape in 2023: What Actually Works]]></title>
      <description><![CDATA[The SBOM tooling ecosystem has matured significantly, but choosing the right tools still requires understanding the tradeoffs between formats, generators, and analysis platforms.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-tooling-landscape-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-tooling-landscape-2023</guid>
      <pubDate>Fri, 15 Sep 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Microsoft's Secure Supply Chain Practices]]></title>
      <description><![CDATA[How Microsoft rebuilt its security posture after years of high-profile incidents, implementing supply chain controls that now protect one of the world's largest software ecosystems.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-secure-supply-chain-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-secure-supply-chain-practices</guid>
      <pubDate>Fri, 15 Sep 2023 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Python Packaging Authority and the Security of pip install]]></title>
      <description><![CDATA[Every pip install is a trust decision. The Python Packaging Authority has spent years hardening the ecosystem, but the attack surface remains vast and the threat actors are persistent.]]></description>
      <link>https://safeguard.sh/resources/blog/python-packaging-authority-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-packaging-authority-security</guid>
      <pubDate>Fri, 15 Sep 2023 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[MGM Resorts and Caesars Hit by Scattered Spider: Social Engineering at Scale]]></title>
      <description><![CDATA[In September 2023, the Scattered Spider hacking group crippled MGM Resorts and extorted Caesars Entertainment through phone-based social engineering, exposing how human vulnerabilities can bypass even the most expensive security stacks.]]></description>
      <link>https://safeguard.sh/resources/blog/mgm-resorts-caesars-scattered-spider-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mgm-resorts-caesars-scattered-spider-2023</guid>
      <pubDate>Thu, 14 Sep 2023 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Dependabot Security Updates: Behavior Deep Dive]]></title>
      <description><![CDATA[A hands-on look at how Dependabot security updates behave in 2023 - PR grouping, semver strategy, transitive coverage, and alternatives when it misses a fix.]]></description>
      <link>https://safeguard.sh/resources/blog/dependabot-security-updates-behavior-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependabot-security-updates-behavior-2023</guid>
      <pubDate>Tue, 12 Sep 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Electron App Supply Chain Security Posture]]></title>
      <description><![CDATA[Electron apps ship Chromium, Node.js, and your entire npm tree to a user's desktop, running with the privileges of the logged-in user. The supply chain implications are severe enough that they deserve their own category of threat model.]]></description>
      <link>https://safeguard.sh/resources/blog/electron-app-supply-chain-security-posture</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/electron-app-supply-chain-security-posture</guid>
      <pubDate>Tue, 12 Sep 2023 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[API Security Through the Supply Chain Lens]]></title>
      <description><![CDATA[APIs are both an attack surface and a supply chain dependency. This guide examines API security risks from authentication to third-party integrations.]]></description>
      <link>https://safeguard.sh/resources/blog/api-security-supply-chain-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/api-security-supply-chain-considerations</guid>
      <pubDate>Tue, 12 Sep 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Canada's Cybersecurity Strategy and the Push for SBOM Adoption]]></title>
      <description><![CDATA[Canada is integrating software supply chain security into its national cyber strategy. Here's where SBOMs fit in and what's coming next.]]></description>
      <link>https://safeguard.sh/resources/blog/canada-cyber-security-strategy-sbom</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/canada-cyber-security-strategy-sbom</guid>
      <pubDate>Tue, 12 Sep 2023 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Dart/Flutter Dependency Security: Securing the Mobile Supply Chain]]></title>
      <description><![CDATA[Flutter's pub ecosystem is growing fast. The security tooling has not kept pace. Here is what you need to know about securing Dart dependencies.]]></description>
      <link>https://safeguard.sh/resources/blog/dart-flutter-dependency-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dart-flutter-dependency-security</guid>
      <pubDate>Tue, 12 Sep 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Packages Security Features: What You Get and What You Do Not]]></title>
      <description><![CDATA[GitHub Packages integrates tightly with GitHub Actions and repositories. Its security features are convenient but have gaps that teams need to understand.]]></description>
      <link>https://safeguard.sh/resources/blog/github-packages-security-features</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-packages-security-features</guid>
      <pubDate>Tue, 12 Sep 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Building a Supply Chain Security Metrics Dashboard That Drives Action]]></title>
      <description><![CDATA[Most security dashboards display data nobody acts on. Here is how to build supply chain metrics that actually drive security improvement.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-metrics-dashboard</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-metrics-dashboard</guid>
      <pubDate>Tue, 12 Sep 2023 10:00:00 GMT</pubDate>
      <category>Security Operations</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[gRPC Security Considerations: Protecting High-Performance Service Communication]]></title>
      <description><![CDATA[gRPC's binary protocol and HTTP/2 transport make it fast. They also make it harder to inspect, monitor, and secure than REST APIs. Here is what you need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/grpc-security-considerations-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/grpc-security-considerations-guide</guid>
      <pubDate>Tue, 12 Sep 2023 00:00:00 GMT</pubDate>
      <category>API Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SLSA v1.0: Software Provenance Attestation Goes Mainstream]]></title>
      <description><![CDATA[The SLSA framework reached v1.0 in April 2023, providing a practical framework for software supply chain integrity that's already being adopted by major package registries.]]></description>
      <link>https://safeguard.sh/resources/blog/software-provenance-attestation-slsa-v1</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-provenance-attestation-slsa-v1</guid>
      <pubDate>Sun, 10 Sep 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Edge Computing and the Distributed Supply Chain Security Challenge]]></title>
      <description><![CDATA[As compute moves to the edge, software supply chain security must adapt to environments with limited visibility, constrained resources, and vast attack surfaces.]]></description>
      <link>https://safeguard.sh/resources/blog/edge-computing-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/edge-computing-software-supply-chain</guid>
      <pubDate>Fri, 08 Sep 2023 14:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Build System Poisoning Techniques: How Attackers Corrupt Your Pipeline]]></title>
      <description><![CDATA[Build systems transform source code into deployable artifacts. When attackers poison the build, every artifact is compromised. Here is how it happens.]]></description>
      <link>https://safeguard.sh/resources/blog/build-system-poisoning-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/build-system-poisoning-techniques</guid>
      <pubDate>Fri, 08 Sep 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Cloud Marketplace Security: What AWS and Azure Listings Actually Verify]]></title>
      <description><![CDATA[Buying software through AWS Marketplace or Azure Marketplace feels safe. But what security verification actually happens before a listing goes live?]]></description>
      <link>https://safeguard.sh/resources/blog/cloud-marketplace-security-aws-azure</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloud-marketplace-security-aws-azure</guid>
      <pubDate>Fri, 08 Sep 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Cache Poisoning Attacks: How They Work and How to Prevent Them]]></title>
      <description><![CDATA[Cache poisoning attacks manipulate web caches to serve malicious content to other users. This guide covers web cache poisoning, DNS cache poisoning, and practical defenses for modern applications.]]></description>
      <link>https://safeguard.sh/resources/blog/cache-poisoning-attacks-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cache-poisoning-attacks-prevention</guid>
      <pubDate>Tue, 05 Sep 2023 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[DAST Tool Comparison for Enterprise: What Matters Beyond Feature Lists]]></title>
      <description><![CDATA[Enterprise DAST tools differ in how they handle modern application architectures, API testing, and CI/CD integration. Here is what to evaluate when choosing a DAST solution.]]></description>
      <link>https://safeguard.sh/resources/blog/dast-tool-comparison-enterprise-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dast-tool-comparison-enterprise-2023</guid>
      <pubDate>Tue, 05 Sep 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Massive PyPI Malware Campaign Targets Developers with Credential Stealers]]></title>
      <description><![CDATA[A sustained campaign flooded PyPI with hundreds of malicious packages using typosquatting and dependency confusion to steal credentials and cryptocurrency from developers.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-malware-campaign-targeting-developers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-malware-campaign-targeting-developers</guid>
      <pubDate>Tue, 05 Sep 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Pipenv Security Posture Review]]></title>
      <description><![CDATA[Pipenv is still in production at many companies. Here is an honest look at its security model, its maintenance status, and when it is time to migrate away.]]></description>
      <link>https://safeguard.sh/resources/blog/pipenv-security-posture-review-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pipenv-security-posture-review-2023</guid>
      <pubDate>Wed, 30 Aug 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Ransomware Payment Ban Debate: Arguments, Evidence, and Unintended Consequences]]></title>
      <description><![CDATA[Should governments ban ransomware payments? The debate intensified through 2023 as attacks escalated, with strong arguments on both sides and no clear consensus.]]></description>
      <link>https://safeguard.sh/resources/blog/ransomware-payment-ban-debate-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ransomware-payment-ban-debate-analysis</guid>
      <pubDate>Mon, 28 Aug 2023 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Secure Package Publishing Checklist for Open Source Maintainers]]></title>
      <description><![CDATA[Publishing a package to a public registry makes your code part of thousands of supply chains. This checklist covers the security controls that responsible maintainers implement before and during publication.]]></description>
      <link>https://safeguard.sh/resources/blog/secure-package-publishing-checklist</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/secure-package-publishing-checklist</guid>
      <pubDate>Mon, 28 Aug 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Changelog and Security Disclosure Best Practices]]></title>
      <description><![CDATA[How you communicate security changes in your changelog affects both your users' safety and your project's trustworthiness. Here is how to get it right.]]></description>
      <link>https://safeguard.sh/resources/blog/changelog-security-disclosure-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/changelog-security-disclosure-practices</guid>
      <pubDate>Mon, 28 Aug 2023 09:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Bitbucket Pipelines Security Guide]]></title>
      <description><![CDATA[Securing Bitbucket Pipelines with secure variables, deployment permissions, and pipeline hardening.]]></description>
      <link>https://safeguard.sh/resources/blog/bitbucket-pipelines-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bitbucket-pipelines-security-guide</guid>
      <pubDate>Fri, 25 Aug 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Runtime SBOM vs. Build-Time SBOM: Which Do You Actually Need?]]></title>
      <description><![CDATA[Build-time SBOMs capture what goes into your software; runtime SBOMs capture what actually runs. Understanding the difference is critical for accurate vulnerability management.]]></description>
      <link>https://safeguard.sh/resources/blog/runtime-sbom-vs-build-time-sbom</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/runtime-sbom-vs-build-time-sbom</guid>
      <pubDate>Fri, 25 Aug 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Security Incident Communication Guide]]></title>
      <description><![CDATA[How to communicate during and after a security incident without making things worse. Templates, timelines, and principles for crisis communication.]]></description>
      <link>https://safeguard.sh/resources/blog/security-incident-communication-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-incident-communication-guide</guid>
      <pubDate>Fri, 25 Aug 2023 00:00:00 GMT</pubDate>
      <category>Organizational Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Socket.dev: Detecting Supply Chain Attacks Before They Hit]]></title>
      <description><![CDATA[A review of Socket.dev's approach to supply chain security, focusing on behavior analysis of npm packages, install script detection, and typosquatting prevention.]]></description>
      <link>https://safeguard.sh/resources/blog/socket-dev-supply-chain-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/socket-dev-supply-chain-detection</guid>
      <pubDate>Tue, 22 Aug 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[WinRAR Zero-Day CVE-2023-38831: Weaponized Archives in the Wild]]></title>
      <description><![CDATA[A WinRAR vulnerability exploited since April 2023 allowed attackers to execute arbitrary code when users opened seemingly harmless files inside ZIP archives.]]></description>
      <link>https://safeguard.sh/resources/blog/winrar-cve-2023-38831-zero-day-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/winrar-cve-2023-38831-zero-day-exploitation</guid>
      <pubDate>Sun, 20 Aug 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Japan's Approach to Cybersecurity and Software Supply Chain Security]]></title>
      <description><![CDATA[Japan is rapidly building cybersecurity policy around software supply chain risk. Here's what the regulatory landscape looks like and where it's headed.]]></description>
      <link>https://safeguard.sh/resources/blog/japan-cybersecurity-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/japan-cybersecurity-software-supply-chain</guid>
      <pubDate>Sun, 20 Aug 2023 08:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[pip Install Hooks Security: The Python Packaging Backdoor]]></title>
      <description><![CDATA[Python's setup.py runs arbitrary code during package installation. Despite efforts to move to declarative metadata, the risk persists.]]></description>
      <link>https://safeguard.sh/resources/blog/pip-install-hooks-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pip-install-hooks-security</guid>
      <pubDate>Fri, 18 Aug 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[DevSecOps Toolchain Integration Patterns That Actually Work]]></title>
      <description><![CDATA[Most DevSecOps tool integrations fail because they are bolted on rather than designed in. Here are integration patterns that provide security value without breaking the developer experience.]]></description>
      <link>https://safeguard.sh/resources/blog/devsecops-toolchain-integration-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/devsecops-toolchain-integration-patterns</guid>
      <pubDate>Fri, 18 Aug 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Network Policies Deep Dive: From Zero Trust to Microsegmentation]]></title>
      <description><![CDATA[By default, every pod can talk to every other pod. Network policies change that, but most implementations are incomplete. Here is how to build real microsegmentation in Kubernetes.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-network-policies-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-network-policies-deep-dive</guid>
      <pubDate>Fri, 18 Aug 2023 00:00:00 GMT</pubDate>
      <category>Kubernetes Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Threat Hunting in the Software Supply Chain]]></title>
      <description><![CDATA[Proactive threat hunting techniques adapted for software supply chain security—because waiting for alerts isn't enough when adversaries hide in your dependencies.]]></description>
      <link>https://safeguard.sh/resources/blog/threat-hunting-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/threat-hunting-software-supply-chain</guid>
      <pubDate>Fri, 18 Aug 2023 00:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Security Champions With a Supply Chain Focus]]></title>
      <description><![CDATA[Designing and running a security champions program specifically for supply chain risks, including recruitment, training, cadences, and measurable impact.]]></description>
      <link>https://safeguard.sh/resources/blog/security-champions-program-supply-chain-focus</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-champions-program-supply-chain-focus</guid>
      <pubDate>Wed, 16 Aug 2023 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Remediation SLAs: Best Practices for Real Teams]]></title>
      <description><![CDATA[Setting vulnerability remediation deadlines is easy. Actually meeting them is hard. This guide covers practical SLA frameworks that balance security urgency with engineering reality.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-remediation-sla-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-remediation-sla-best-practices</guid>
      <pubDate>Tue, 15 Aug 2023 11:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Dependabot and the State of Automated Dependency Security]]></title>
      <description><![CDATA[Dependabot has become the default for dependency updates, but its limitations highlight why automated scanning alone isn't enough for supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/github-dependabot-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-dependabot-supply-chain-security</guid>
      <pubDate>Tue, 15 Aug 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Africa's Digital Transformation: Security Challenges at Scale]]></title>
      <description><![CDATA[Africa is leapfrogging traditional IT infrastructure with mobile-first, cloud-native solutions. But the cybersecurity foundations are lagging dangerously behind the pace of adoption.]]></description>
      <link>https://safeguard.sh/resources/blog/africa-digital-transformation-security-challenges</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/africa-digital-transformation-security-challenges</guid>
      <pubDate>Tue, 15 Aug 2023 00:00:00 GMT</pubDate>
      <category>Regional Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Google Cloud Build Supply Chain Security: From Source to Deploy]]></title>
      <description><![CDATA[How to secure your Cloud Build pipelines with SLSA provenance, Binary Authorization, and artifact verification for end-to-end supply chain integrity.]]></description>
      <link>https://safeguard.sh/resources/blog/google-cloud-build-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/google-cloud-build-supply-chain-security</guid>
      <pubDate>Sat, 12 Aug 2023 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Ingress Security Configuration: Getting It Right]]></title>
      <description><![CDATA[Ingress controllers are the front door to your Kubernetes cluster. Misconfigurations here expose everything behind them.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-ingress-security-configuration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-ingress-security-configuration</guid>
      <pubDate>Sat, 12 Aug 2023 10:00:00 GMT</pubDate>
      <category>Kubernetes Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Terraform Provider Verification: Securing Your Infrastructure as Code Supply Chain]]></title>
      <description><![CDATA[Terraform providers are plugins that execute with full access to your infrastructure credentials. Verifying their integrity is not optional.]]></description>
      <link>https://safeguard.sh/resources/blog/terraform-provider-verification-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/terraform-provider-verification-guide</guid>
      <pubDate>Sat, 12 Aug 2023 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes 1.27 Security Highlights]]></title>
      <description><![CDATA[Kubernetes 1.27 graduated seccomp default, introduced in-place pod resize, and cleaned up admission. Here is what actually matters for cluster security.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-1-27-security-highlights</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-1-27-security-highlights</guid>
      <pubDate>Fri, 11 Aug 2023 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[npm Lockfile v3 Security Improvements]]></title>
      <description><![CDATA[Lockfile v3 is more than a format bump. It quietly fixed a class of integrity bugs that plagued v1 and v2, and the difference matters more than most teams realize.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-lockfile-v3-security-improvements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-lockfile-v3-security-improvements</guid>
      <pubDate>Thu, 10 Aug 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[LLM Prompt Injection: The New Supply Chain Attack Vector]]></title>
      <description><![CDATA[Prompt injection attacks against large language models represent a dangerous new frontier in software supply chain security. Here's what defenders need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/llm-prompt-injection-supply-chain-risk</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/llm-prompt-injection-supply-chain-risk</guid>
      <pubDate>Thu, 10 Aug 2023 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Internal Package Naming Best Practices to Prevent Dependency Confusion]]></title>
      <description><![CDATA[The wrong naming convention for internal packages makes dependency confusion attacks trivial. Here is how to name packages so attackers cannot substitute them.]]></description>
      <link>https://safeguard.sh/resources/blog/internal-package-naming-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/internal-package-naming-best-practices</guid>
      <pubDate>Tue, 08 Aug 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Ivanti EPMM Zero-Day CVE-2023-35078: Norwegian Government Breach]]></title>
      <description><![CDATA[A critical authentication bypass in Ivanti's Endpoint Manager Mobile was exploited to breach Norwegian government agencies, earning a perfect CVSS 10.0 score.]]></description>
      <link>https://safeguard.sh/resources/blog/ivanti-epmm-cve-2023-35078-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ivanti-epmm-cve-2023-35078-zero-day</guid>
      <pubDate>Tue, 08 Aug 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[The Hidden Risk of Abandoned Open Source Projects]]></title>
      <description><![CDATA[Abandoned open source projects do not disappear. They continue to be installed, depended upon, and deployed in production. They just stop getting security patches.]]></description>
      <link>https://safeguard.sh/resources/blog/abandoned-open-source-project-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/abandoned-open-source-project-risks</guid>
      <pubDate>Tue, 08 Aug 2023 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[How to Generate SBOMs From Maven Projects]]></title>
      <description><![CDATA[Produce accurate CycloneDX SBOMs from Maven builds using the official plugin, handle multi-module reactors, and ship attested SBOMs alongside your JARs.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-generate-sboms-from-maven-projects-cli</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-generate-sboms-from-maven-projects-cli</guid>
      <pubDate>Sat, 05 Aug 2023 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Game Day Exercises for Supply Chain Incidents: Practicing Before the Real Thing]]></title>
      <description><![CDATA[Game day exercises simulate supply chain attacks and failures, testing your team's response procedures before a real incident hits. Here is how to plan and run effective supply chain game days.]]></description>
      <link>https://safeguard.sh/resources/blog/game-day-exercises-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/game-day-exercises-supply-chain</guid>
      <pubDate>Sat, 05 Aug 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Template Injection (SSTI) Prevention Guide]]></title>
      <description><![CDATA[Server-Side Template Injection turns template engines into code execution engines. This guide covers SSTI in Jinja2, Twig, Freemarker, and other engines, with detection techniques and layered defenses.]]></description>
      <link>https://safeguard.sh/resources/blog/template-injection-ssti-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/template-injection-ssti-prevention</guid>
      <pubDate>Sat, 05 Aug 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[OSV Schema: The Open Source Vulnerability Database Format Explained]]></title>
      <description><![CDATA[OSV provides a standardized format for vulnerability data that is purpose-built for open-source ecosystems. Here is how it works and why it is better than NVD for dependency scanning.]]></description>
      <link>https://safeguard.sh/resources/blog/osv-schema-vulnerability-database-format</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/osv-schema-vulnerability-database-format</guid>
      <pubDate>Sat, 05 Aug 2023 09:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Pharmaceutical Software Validation and Supply Chain Security]]></title>
      <description><![CDATA[Pharma companies must validate software used in drug manufacturing and clinical trials. Software supply chain security is now part of that equation.]]></description>
      <link>https://safeguard.sh/resources/blog/pharmaceutical-software-validation-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pharmaceutical-software-validation-supply-chain</guid>
      <pubDate>Sat, 05 Aug 2023 09:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[npm Tightens Unpublish Rules: What It Means for Supply Chain Security]]></title>
      <description><![CDATA[npm's updated unpublish policy addresses the left-pad problem while balancing maintainer rights, but the supply chain implications go deeper than most realize.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-unpublish-policy-changes-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-unpublish-policy-changes-2023</guid>
      <pubDate>Tue, 01 Aug 2023 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Kotlin detekt Security Rules: Catching Vulnerabilities in Kotlin Code]]></title>
      <description><![CDATA[detekt is Kotlin's primary static analysis tool. Its security-relevant rules catch patterns that lead to vulnerabilities in Android and server-side Kotlin.]]></description>
      <link>https://safeguard.sh/resources/blog/kotlin-detekt-security-rules</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kotlin-detekt-security-rules</guid>
      <pubDate>Fri, 28 Jul 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Vulnerability Rewards: Can Bug Bounties Save Open Source?]]></title>
      <description><![CDATA[Google expanded its OSS vulnerability rewards program in 2023, paying researchers to find bugs in critical open source projects. It's a promising model, but not a silver bullet.]]></description>
      <link>https://safeguard.sh/resources/blog/oss-vulnerability-rewards-programs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/oss-vulnerability-rewards-programs</guid>
      <pubDate>Fri, 28 Jul 2023 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Distroless Container Images: Stripping the Attack Surface to Nothing]]></title>
      <description><![CDATA[Distroless images remove the shell, package manager, and everything else an attacker needs post-exploitation. Here is how to use them, what breaks, and whether the security tradeoff is worth it.]]></description>
      <link>https://safeguard.sh/resources/blog/distroless-container-images-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/distroless-container-images-security</guid>
      <pubDate>Fri, 28 Jul 2023 00:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Zenbleed: AMD CPU Vulnerability Leaks Data Across Processes (CVE-2023-20593)]]></title>
      <description><![CDATA[A speculative execution bug in AMD Zen 2 processors allows attackers to steal sensitive data at 30KB per core per second, affecting cloud environments and shared infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/zenbleed-amd-cpu-vulnerability-cve-2023-20593</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zenbleed-amd-cpu-vulnerability-cve-2023-20593</guid>
      <pubDate>Mon, 24 Jul 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Golang Module Security and Verification]]></title>
      <description><![CDATA[Securing your Go module supply chain with checksum databases, GOPROXY, and vendor directories.]]></description>
      <link>https://safeguard.sh/resources/blog/golang-module-security-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/golang-module-security-verification</guid>
      <pubDate>Sat, 22 Jul 2023 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Security Challenges in Polyglot Repositories]]></title>
      <description><![CDATA[Repositories containing multiple programming languages multiply the security tooling, configuration, and expertise required. These challenges are manageable with the right approach.]]></description>
      <link>https://safeguard.sh/resources/blog/polyglot-repository-security-challenges</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/polyglot-repository-security-challenges</guid>
      <pubDate>Sat, 22 Jul 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Python Wheel Security Verification: What You Are Missing]]></title>
      <description><![CDATA[Python wheels are the standard packaging format, but their security verification story has significant gaps that most developers never consider.]]></description>
      <link>https://safeguard.sh/resources/blog/python-wheel-security-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-wheel-security-verification</guid>
      <pubDate>Sat, 22 Jul 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Automated Security Testing in CI/CD Pipelines]]></title>
      <description><![CDATA[A hands-on guide to embedding SAST, SCA, secret scanning, and container analysis into your CI/CD pipeline without making builds unbearably slow.]]></description>
      <link>https://safeguard.sh/resources/blog/automated-security-testing-in-ci-cd</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/automated-security-testing-in-ci-cd</guid>
      <pubDate>Sat, 22 Jul 2023 08:00:00 GMT</pubDate>
      <category>How-To Guide</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[IAST Explained: Why Instrumented Security Testing Catches What Others Miss]]></title>
      <description><![CDATA[IAST combines the precision of SAST with the realism of DAST. Here is how it works, where it fits, and what it actually costs to deploy.]]></description>
      <link>https://safeguard.sh/resources/blog/interactive-application-security-testing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/interactive-application-security-testing</guid>
      <pubDate>Sat, 22 Jul 2023 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Reproducible Builds in the Go Ecosystem]]></title>
      <description><![CDATA[Go's toolchain makes reproducible builds unusually tractable. Here is how to reach bit-for-bit builds across machines in 2023, and where the rough edges remain.]]></description>
      <link>https://safeguard.sh/resources/blog/reproducible-builds-go-ecosystem-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/reproducible-builds-go-ecosystem-2023</guid>
      <pubDate>Thu, 20 Jul 2023 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Aqua Security Platform Review: Cloud Native Security Done Right]]></title>
      <description><![CDATA[An in-depth review of the Aqua Security platform covering container security, runtime protection, Kubernetes scanning, and how it fits into a modern DevSecOps workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/aqua-security-platform-review-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aqua-security-platform-review-2023</guid>
      <pubDate>Thu, 20 Jul 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[CI/CD Secret Sprawl: How Pipeline Credentials Become Your Biggest Risk]]></title>
      <description><![CDATA[Your CI/CD pipeline has more credentials than your production environment. Secret sprawl across pipelines creates a massive attack surface that most teams cannot even inventory.]]></description>
      <link>https://safeguard.sh/resources/blog/ci-cd-secret-sprawl-management</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ci-cd-secret-sprawl-management</guid>
      <pubDate>Thu, 20 Jul 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[How to Structure an SBOM Review Process]]></title>
      <description><![CDATA[Build a repeatable SBOM review workflow that catches license risks, stale dependencies, and unexpected components before they ship to customers.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-structure-an-sbom-review-process</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-structure-an-sbom-review-process</guid>
      <pubDate>Tue, 18 Jul 2023 12:00:00 GMT</pubDate>
      <category>SBOM & Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[WebAssembly Security: New Capabilities, New Supply Chain Questions]]></title>
      <description><![CDATA[WebAssembly is expanding beyond the browser into server-side and edge workloads. The security model and supply chain implications deserve closer scrutiny.]]></description>
      <link>https://safeguard.sh/resources/blog/wasm-webassembly-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/wasm-webassembly-security-considerations</guid>
      <pubDate>Tue, 18 Jul 2023 12:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Citrix NetScaler Zero-Day CVE-2023-3519: Mass Exploitation in the Wild]]></title>
      <description><![CDATA[CVE-2023-3519 allowed unauthenticated remote code execution on Citrix NetScaler ADC and Gateway devices, leading to widespread exploitation and CISA emergency directives.]]></description>
      <link>https://safeguard.sh/resources/blog/citrix-netscaler-cve-2023-3519-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/citrix-netscaler-cve-2023-3519-zero-day</guid>
      <pubDate>Tue, 18 Jul 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Risk Scoring Algorithms: How They Work and Where They Fail]]></title>
      <description><![CDATA[Risk scoring turns complex supply chain data into actionable numbers. But the algorithms behind these scores have assumptions and blind spots that security teams must understand.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-risk-scoring-algorithms</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-risk-scoring-algorithms</guid>
      <pubDate>Tue, 18 Jul 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Aerospace and Defense Software Supply Chain Security]]></title>
      <description><![CDATA[Aerospace and defense organizations face nation-state threats targeting software supply chains. Here's how to build resilience in high-assurance environments.]]></description>
      <link>https://safeguard.sh/resources/blog/aerospace-defense-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aerospace-defense-software-supply-chain</guid>
      <pubDate>Tue, 18 Jul 2023 09:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Security Debt: Tracking and Remediation Strategies]]></title>
      <description><![CDATA[Security debt accumulates silently—unpatched dependencies, skipped reviews, deferred upgrades. Here's how to measure it and pay it down systematically.]]></description>
      <link>https://safeguard.sh/resources/blog/security-debt-tracking-remediation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-debt-tracking-remediation</guid>
      <pubDate>Tue, 18 Jul 2023 00:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Svelte and SvelteKit Security Best Practices for Production Apps]]></title>
      <description><![CDATA[Svelte's compile-time approach reduces runtime attack surface, but SvelteKit introduces server-side considerations that require deliberate security attention. A practical guide.]]></description>
      <link>https://safeguard.sh/resources/blog/svelte-sveltekit-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/svelte-sveltekit-security-best-practices</guid>
      <pubDate>Tue, 18 Jul 2023 00:00:00 GMT</pubDate>
      <category>Developer Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[ITAR and EAR Export Controls: What Software Teams Need to Know]]></title>
      <description><![CDATA[Export control regulations affect software development more than most teams realize. Here's how ITAR and EAR intersect with software supply chains.]]></description>
      <link>https://safeguard.sh/resources/blog/itar-ear-export-control-software</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/itar-ear-export-control-software</guid>
      <pubDate>Sat, 15 Jul 2023 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[The Economics of Vulnerability Bounties: Who Wins and Who Loses]]></title>
      <description><![CDATA[Bug bounty programs are a billion-dollar market. But the economics do not work equally well for everyone. A look at who benefits, who gets shortchanged, and what the numbers actually say.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-bounty-economics-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-bounty-economics-analysis</guid>
      <pubDate>Sat, 15 Jul 2023 00:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Zimbra Collaboration CVE-2023-37580: XSS Zero-Day Exploited by Four Nation-State Groups]]></title>
      <description><![CDATA[A reflected XSS vulnerability in Zimbra Collaboration was exploited by four distinct threat groups targeting government organizations worldwide. The campaign showed how even 'low severity' bugs enable espionage.]]></description>
      <link>https://safeguard.sh/resources/blog/zimbra-collaboration-cve-2023-37580-xss</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zimbra-collaboration-cve-2023-37580-xss</guid>
      <pubDate>Thu, 13 Jul 2023 11:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[JumpCloud Supply Chain Attack: North Korea's Lazarus Group Strikes Again]]></title>
      <description><![CDATA[How North Korean threat actors compromised JumpCloud's infrastructure to target cryptocurrency firms through a sophisticated supply chain attack in July 2023.]]></description>
      <link>https://safeguard.sh/resources/blog/jumpcloud-supply-chain-attack-north-korea</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jumpcloud-supply-chain-attack-north-korea</guid>
      <pubDate>Wed, 12 Jul 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Load Balancer Security Considerations for Modern Architectures]]></title>
      <description><![CDATA[Load balancers terminate TLS, distribute traffic, and make routing decisions. Their security configuration affects every service behind them.]]></description>
      <link>https://safeguard.sh/resources/blog/load-balancer-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/load-balancer-security-considerations</guid>
      <pubDate>Wed, 12 Jul 2023 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Rate Limiting in Package Registries: Balancing Security and Developer Experience]]></title>
      <description><![CDATA[Docker Hub's rate limits broke builds worldwide. Rate limiting is necessary for registry security, but getting it wrong disrupts entire engineering organizations.]]></description>
      <link>https://safeguard.sh/resources/blog/rate-limiting-package-registries</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rate-limiting-package-registries</guid>
      <pubDate>Wed, 12 Jul 2023 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Chaining: Real-World Examples and Defense Strategies]]></title>
      <description><![CDATA[Individual vulnerabilities rarely tell the full story. This deep dive examines how attackers chain low-severity bugs into devastating exploits and how defenders can break the chain.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-chaining-real-world-examples</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-chaining-real-world-examples</guid>
      <pubDate>Wed, 12 Jul 2023 08:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Stripe's Dependency Security Practices]]></title>
      <description><![CDATA[How Stripe secures its software dependencies while processing billions of dollars in payments, with a focus on Ruby ecosystem hardening and dependency isolation.]]></description>
      <link>https://safeguard.sh/resources/blog/stripe-dependency-security-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/stripe-dependency-security-practices</guid>
      <pubDate>Wed, 12 Jul 2023 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Digital Twins and Supply Chain Security: Securing the Virtual Mirror]]></title>
      <description><![CDATA[Digital twins replicate physical systems in software. When the software supply chain of a digital twin is compromised, the consequences extend to the physical world.]]></description>
      <link>https://safeguard.sh/resources/blog/digital-twin-security-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/digital-twin-security-supply-chain</guid>
      <pubDate>Mon, 10 Jul 2023 11:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Cloud-Native SBOM Generation Strategies That Actually Work]]></title>
      <description><![CDATA[Practical strategies for generating and managing Software Bills of Materials in cloud-native environments, beyond the compliance checkbox.]]></description>
      <link>https://safeguard.sh/resources/blog/cloud-native-sbom-generation-strategies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloud-native-sbom-generation-strategies</guid>
      <pubDate>Mon, 10 Jul 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Nonprofit Organization Cybersecurity: A Practical Guide]]></title>
      <description><![CDATA[Nonprofits handle donor data and sensitive beneficiary information with limited budgets. Here's a realistic guide to managing software security on nonprofit resources.]]></description>
      <link>https://safeguard.sh/resources/blog/nonprofit-organization-cybersecurity-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nonprofit-organization-cybersecurity-guide</guid>
      <pubDate>Sat, 08 Jul 2023 11:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SSH Key Management for Organizations: Beyond the Basics]]></title>
      <description><![CDATA[SSH keys provide access to your most critical infrastructure. Most organizations manage them poorly. Here is how to do it right.]]></description>
      <link>https://safeguard.sh/resources/blog/ssh-key-management-organizations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ssh-key-management-organizations</guid>
      <pubDate>Sat, 08 Jul 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[CircleCI Security Configuration Guide]]></title>
      <description><![CDATA[Practical steps to secure your CircleCI pipelines, from context management and OIDC to orb vetting and runner isolation.]]></description>
      <link>https://safeguard.sh/resources/blog/circleci-security-configuration-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/circleci-security-configuration-guide</guid>
      <pubDate>Sat, 08 Jul 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Advanced Security: CodeQL, Dependabot, and Secret Scanning in Practice]]></title>
      <description><![CDATA[A review of GitHub Advanced Security covering CodeQL SAST, Dependabot SCA, secret scanning, and how the integrated security experience works for development teams.]]></description>
      <link>https://safeguard.sh/resources/blog/github-advanced-security-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-advanced-security-review</guid>
      <pubDate>Sat, 08 Jul 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Clop Ransomware and the MOVEit Campaign: Mass Exploitation at Scale]]></title>
      <description><![CDATA[Clop's exploitation of MOVEit Transfer compromised over 2,500 organizations in one campaign, demonstrating a shift from traditional ransomware to mass vulnerability exploitation.]]></description>
      <link>https://safeguard.sh/resources/blog/clop-ransomware-moveit-campaign-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/clop-ransomware-moveit-campaign-analysis</guid>
      <pubDate>Wed, 05 Jul 2023 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Electron ContextBridge Security: Building Safe Desktop Apps]]></title>
      <description><![CDATA[Electron's ContextBridge is the secure boundary between web content and Node.js APIs. This guide covers how to use it correctly, common mistakes that create RCE vulnerabilities, and security best practices for Electron applications.]]></description>
      <link>https://safeguard.sh/resources/blog/electron-contextbridge-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/electron-contextbridge-security</guid>
      <pubDate>Wed, 05 Jul 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NuGet Package Tampering Detection: Securing the .NET Supply Chain]]></title>
      <description><![CDATA[NuGet packages can be tampered with at multiple points in the supply chain. Here is how to detect and prevent package tampering in your .NET projects.]]></description>
      <link>https://safeguard.sh/resources/blog/nuget-package-tampering-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nuget-package-tampering-detection</guid>
      <pubDate>Wed, 05 Jul 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Starjacking Attacks on Package Registries: Exploiting Repository Trust]]></title>
      <description><![CDATA[Starjacking exploits the trust developers place in GitHub stars and repository metadata. Attackers link malicious packages to popular repositories to appear legitimate. Here is how it works.]]></description>
      <link>https://safeguard.sh/resources/blog/starjacking-attacks-package-registries</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/starjacking-attacks-package-registries</guid>
      <pubDate>Wed, 05 Jul 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Domain Squatting and Package Registry Attacks]]></title>
      <description><![CDATA[Typosquatting and domain squatting in package registries trick developers into installing malicious packages. The attack is trivially easy to execute and remarkably effective.]]></description>
      <link>https://safeguard.sh/resources/blog/domain-squatting-package-registries</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/domain-squatting-package-registries</guid>
      <pubDate>Wed, 05 Jul 2023 00:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Kotlin Gradle Dependency Verification]]></title>
      <description><![CDATA[Implement dependency verification in Kotlin Gradle projects with checksums, PGP signatures, and repository filtering.]]></description>
      <link>https://safeguard.sh/resources/blog/kotlin-gradle-dependency-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kotlin-gradle-dependency-verification</guid>
      <pubDate>Fri, 30 Jun 2023 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Automated SBOM Drift Detection: When Your Bill of Materials Goes Stale]]></title>
      <description><![CDATA[An SBOM that does not match what is actually deployed is worse than no SBOM at all. Here is how to detect and prevent SBOM drift automatically.]]></description>
      <link>https://safeguard.sh/resources/blog/automated-sbom-drift-detection</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/automated-sbom-drift-detection</guid>
      <pubDate>Wed, 28 Jun 2023 09:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Harness CI/CD Security Features]]></title>
      <description><![CDATA[Leveraging Harness platform security capabilities including governance policies, secret management, and pipeline security controls.]]></description>
      <link>https://safeguard.sh/resources/blog/harness-ci-cd-security-features</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/harness-ci-cd-security-features</guid>
      <pubDate>Wed, 28 Jun 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MOVEit Vulnerability Mass Exploitation: A Field Analysis]]></title>
      <description><![CDATA[Inside the Cl0p ransomware gang's zero-day attack on Progress MOVEit Transfer, the CVE-2023-34362 timeline, and the supply chain lessons it exposed.]]></description>
      <link>https://safeguard.sh/resources/blog/moveit-vulnerability-mass-exploitation-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/moveit-vulnerability-mass-exploitation-analysis</guid>
      <pubDate>Sun, 25 Jun 2023 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Runtime Application Self-Protection (RASP): A Practical Guide]]></title>
      <description><![CDATA[RASP embeds security directly into the application runtime, detecting and blocking attacks from inside the app. It's powerful, controversial, and misunderstood. Here's what actually works.]]></description>
      <link>https://safeguard.sh/resources/blog/runtime-application-self-protection-rasp-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/runtime-application-self-protection-rasp-guide</guid>
      <pubDate>Sun, 25 Jun 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Microsegmentation for Software Supply Chain Security]]></title>
      <description><![CDATA[Microsegmentation limits lateral movement after a breach. Applied to software supply chains, it contains the blast radius when a dependency, build tool, or vendor is compromised.]]></description>
      <link>https://safeguard.sh/resources/blog/microsegmentation-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsegmentation-supply-chain-security</guid>
      <pubDate>Sun, 25 Jun 2023 00:00:00 GMT</pubDate>
      <category>Security Architecture</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Automotive Cybersecurity: UNECE WP.29 and Software Supply Chain Security]]></title>
      <description><![CDATA[Connected vehicles depend on millions of lines of code. UNECE WP.29 regulations now require automotive manufacturers to manage software supply chain risks.]]></description>
      <link>https://safeguard.sh/resources/blog/automotive-cybersecurity-unece-wp29</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/automotive-cybersecurity-unece-wp29</guid>
      <pubDate>Thu, 22 Jun 2023 10:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Microsoft Teams Vulnerability: External Tenant Attacks and the Collaboration Security Gap]]></title>
      <description><![CDATA[Researchers demonstrated that Microsoft Teams' default configuration allowed external attackers to deliver malware directly to employees, bypassing email security controls entirely.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-teams-vulnerability-giftofspeed</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-teams-vulnerability-giftofspeed</guid>
      <pubDate>Thu, 22 Jun 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[SpotBugs Security Detectors for Java: A Practical Guide]]></title>
      <description><![CDATA[SpotBugs with Find Security Bugs is the most effective free security analysis tool for Java. Here is how to get real results from it.]]></description>
      <link>https://safeguard.sh/resources/blog/spotbugs-security-detectors-java</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spotbugs-security-detectors-java</guid>
      <pubDate>Thu, 22 Jun 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[CycloneDX v1.5: New Features and What They Mean for Your SBOM Program]]></title>
      <description><![CDATA[CycloneDX v1.5 introduced formulation, machine learning BOMs, and expanded evidence. Here is what changed and how to take advantage of it.]]></description>
      <link>https://safeguard.sh/resources/blog/cyclonedx-v1-5-new-features-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cyclonedx-v1-5-new-features-guide</guid>
      <pubDate>Tue, 20 Jun 2023 14:00:00 GMT</pubDate>
      <category>SBOM Standards</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Quantum Computing and the Coming Cryptography Crisis in Supply Chains]]></title>
      <description><![CDATA[Quantum computers threaten the cryptographic foundations of software supply chains. The time to prepare is now, not when quantum advantage arrives.]]></description>
      <link>https://safeguard.sh/resources/blog/quantum-computing-cryptography-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/quantum-computing-cryptography-supply-chain</guid>
      <pubDate>Tue, 20 Jun 2023 11:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Progress MOVEit: Second Critical Vulnerability Discovered Amid Breach Fallout]]></title>
      <description><![CDATA[While organizations were still reeling from the first MOVEit zero-day, a second critical vulnerability was found — raising questions about the product's security.]]></description>
      <link>https://safeguard.sh/resources/blog/progress-moveit-second-vulnerability-discovered</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/progress-moveit-second-vulnerability-discovered</guid>
      <pubDate>Tue, 20 Jun 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Flask Application Security: A Deep Dive]]></title>
      <description><![CDATA[Flask gives you room to make mistakes. This is a long look at the patterns that keep Flask apps safe in 2023, covering sessions, extensions, Werkzeug, and Jinja.]]></description>
      <link>https://safeguard.sh/resources/blog/flask-application-security-deep-dive-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/flask-application-security-deep-dive-2023</guid>
      <pubDate>Sun, 18 Jun 2023 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Server-Side Request Forgery (SSRF): The Vulnerability That Unlocks Cloud Metadata]]></title>
      <description><![CDATA[SSRF lets attackers reach internal services through your application. In cloud environments, that often means access to instance metadata and IAM credentials.]]></description>
      <link>https://safeguard.sh/resources/blog/server-side-request-forgery-ssrf-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/server-side-request-forgery-ssrf-guide</guid>
      <pubDate>Sun, 18 Jun 2023 00:00:00 GMT</pubDate>
      <category>Code Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Barracuda ESG Zero-Day CVE-2023-2868: When Patching Isn't Enough]]></title>
      <description><![CDATA[Barracuda told customers to physically replace compromised Email Security Gateway appliances. The vulnerability had been exploited since October 2022.]]></description>
      <link>https://safeguard.sh/resources/blog/barracuda-esg-zero-day-cve-2023-2868</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/barracuda-esg-zero-day-cve-2023-2868</guid>
      <pubDate>Thu, 15 Jun 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Security Maturity Benchmarking: How to Measure Against Your Peers]]></title>
      <description><![CDATA[Security maturity models provide structure, but benchmarking against peers provides context. Here is how to build a meaningful security maturity benchmark without falling into common traps.]]></description>
      <link>https://safeguard.sh/resources/blog/security-maturity-benchmarking-peers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-maturity-benchmarking-peers</guid>
      <pubDate>Thu, 15 Jun 2023 09:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[DNS Security and Software Distribution: The Foundation Nobody Secures]]></title>
      <description><![CDATA[Every software download, package install, and API call starts with a DNS query. DNS compromise redirects your supply chain at the most fundamental level — and most organizations have no visibility.]]></description>
      <link>https://safeguard.sh/resources/blog/dns-security-software-distribution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dns-security-software-distribution</guid>
      <pubDate>Thu, 15 Jun 2023 00:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs for Mobile Applications: iOS and Android]]></title>
      <description><![CDATA[Mobile apps ship to millions of devices and can't be patched silently. Here's how to build SBOM practices for iOS and Android development.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-mobile-applications-ios-android</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-mobile-applications-ios-android</guid>
      <pubDate>Thu, 15 Jun 2023 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Snyk vs Dependabot: A Head-to-Head Comparison]]></title>
      <description><![CDATA[Evaluate Snyk and Dependabot on vulnerability detection, ecosystem coverage, CI integration, pricing, and remediation to pick the right SCA tool for your team.]]></description>
      <link>https://safeguard.sh/resources/blog/snyk-vs-dependabot-head-to-head-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/snyk-vs-dependabot-head-to-head-2023</guid>
      <pubDate>Wed, 14 Jun 2023 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Container Base Image Selection: A Security-First Decision Framework]]></title>
      <description><![CDATA[Your base image choice determines your container security baseline. Most teams pick based on size or familiarity, not security properties.]]></description>
      <link>https://safeguard.sh/resources/blog/container-base-image-selection-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-base-image-selection-guide</guid>
      <pubDate>Mon, 12 Jun 2023 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[FortiGate CVE-2023-27997: Critical Heap Overflow in SSL VPN]]></title>
      <description><![CDATA[A pre-authentication heap overflow in FortiOS SSL VPN allowed remote code execution on hundreds of thousands of internet-facing firewalls.]]></description>
      <link>https://safeguard.sh/resources/blog/fortinet-fortigate-cve-2023-27997-heap-overflow</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fortinet-fortigate-cve-2023-27997-heap-overflow</guid>
      <pubDate>Mon, 12 Jun 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[JetBrains Plugin Security Verification: Protecting Your IDE]]></title>
      <description><![CDATA[IDE plugins run with the same privileges as your IDE. A malicious IntelliJ plugin has access to your source code, credentials, and development environment.]]></description>
      <link>https://safeguard.sh/resources/blog/jetbrains-plugin-security-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jetbrains-plugin-security-verification</guid>
      <pubDate>Mon, 12 Jun 2023 10:00:00 GMT</pubDate>
      <category>Developer Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[JFrog Xray: Vulnerability Scanning Built Into Your Artifact Pipeline]]></title>
      <description><![CDATA[A review of JFrog Xray for vulnerability scanning and license compliance, covering its deep integration with Artifactory, impact analysis, and binary-level scanning.]]></description>
      <link>https://safeguard.sh/resources/blog/jfrog-xray-vulnerability-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jfrog-xray-vulnerability-scanning</guid>
      <pubDate>Mon, 12 Jun 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[MOVEit Breach Impact Assessment: The Cl0p Campaign's Fallout]]></title>
      <description><![CDATA[The MOVEit breach became one of the largest data theft incidents in history. Here's an assessment of the damage and what organizations should learn.]]></description>
      <link>https://safeguard.sh/resources/blog/moveit-breach-impact-assessment-cl0p</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/moveit-breach-impact-assessment-cl0p</guid>
      <pubDate>Sat, 10 Jun 2023 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[SWIFT CSCF: Software Security Requirements for Financial Messaging]]></title>
      <description><![CDATA[SWIFT's Customer Security Controls Framework sets mandatory security baselines for financial institutions. Here's the software supply chain angle.]]></description>
      <link>https://safeguard.sh/resources/blog/swift-cscf-software-security-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/swift-cscf-software-security-requirements</guid>
      <pubDate>Sat, 10 Jun 2023 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Spotify's Dependency Management at Scale]]></title>
      <description><![CDATA[Inside Spotify's approach to managing thousands of dependencies across hundreds of microservices, balancing developer autonomy with supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/spotify-dependency-management-at-scale</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spotify-dependency-management-at-scale</guid>
      <pubDate>Sat, 10 Jun 2023 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Vendor Lock-In in Security Tooling: The Hidden Cost of Integration]]></title>
      <description><![CDATA[Deep integration with a security vendor creates efficiency but also dependency. Here is how to evaluate lock-in risk in your security tooling decisions.]]></description>
      <link>https://safeguard.sh/resources/blog/vendor-lock-in-security-tooling</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vendor-lock-in-security-tooling</guid>
      <pubDate>Thu, 08 Jun 2023 10:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Anchore Syft: The Go-To Open Source SBOM Generator]]></title>
      <description><![CDATA[A thorough review of Anchore's Syft SBOM generation tool, covering supported formats, language ecosystems, container scanning, and integration patterns.]]></description>
      <link>https://safeguard.sh/resources/blog/anchore-syft-sbom-generation-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/anchore-syft-sbom-generation-review</guid>
      <pubDate>Thu, 08 Jun 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[CISSP, CEH, OSCP: How Security Certifications Address Supply Chain Risks]]></title>
      <description><![CDATA[Major security certifications are updating their content to cover supply chain threats. Here is what CISSP, CEH, and OSCP teach about supply chain security — and what they miss.]]></description>
      <link>https://safeguard.sh/resources/blog/cissp-ceh-oscp-supply-chain-certifications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cissp-ceh-oscp-supply-chain-certifications</guid>
      <pubDate>Thu, 08 Jun 2023 00:00:00 GMT</pubDate>
      <category>Career Development</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Authentication Bypass: Common Patterns Attackers Exploit]]></title>
      <description><![CDATA[Authentication bypass vulnerabilities let attackers access protected resources without valid credentials. This guide covers the most common bypass patterns found in modern web applications and how to prevent each one.]]></description>
      <link>https://safeguard.sh/resources/blog/authentication-bypass-common-patterns</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/authentication-bypass-common-patterns</guid>
      <pubDate>Mon, 05 Jun 2023 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[EU Cyber Resilience Act: Impact on Software Developers and Open Source]]></title>
      <description><![CDATA[The EU's Cyber Resilience Act will impose mandatory cybersecurity requirements on all software sold in Europe. Here's what developers need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/eu-cyber-resilience-act-impact-on-developers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eu-cyber-resilience-act-impact-on-developers</guid>
      <pubDate>Mon, 05 Jun 2023 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[WireGuard for Development Infrastructure: Fast, Simple, and Secure Tunneling]]></title>
      <description><![CDATA[WireGuard's simplicity and performance make it well-suited for securing development infrastructure. Here is how to deploy it for build servers, artifact repositories, and developer access.]]></description>
      <link>https://safeguard.sh/resources/blog/wireguard-development-infrastructure</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/wireguard-development-infrastructure</guid>
      <pubDate>Mon, 05 Jun 2023 10:00:00 GMT</pubDate>
      <category>Network Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[ChatGPT Plugins and the New Plugin Supply Chain Attack Surface]]></title>
      <description><![CDATA[AI plugins connect LLMs to external services, creating a supply chain of trust that most users never examine. The risks are significant.]]></description>
      <link>https://safeguard.sh/resources/blog/chatgpt-plugins-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chatgpt-plugins-supply-chain-risks</guid>
      <pubDate>Mon, 05 Jun 2023 09:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[npm Install Script Security: The Code That Runs Before Your Code]]></title>
      <description><![CDATA[npm install scripts execute arbitrary code during package installation. They are the most exploited vector in JavaScript supply chain attacks.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-install-script-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-install-script-security</guid>
      <pubDate>Fri, 02 Jun 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[MOVEit Transfer CVE-2023-34362: The Zero-Day That Hit Thousands]]></title>
      <description><![CDATA[The MOVEit Transfer SQL injection zero-day exploited by Cl0p ransomware gang became 2023's most impactful vulnerability. Here's the full technical analysis.]]></description>
      <link>https://safeguard.sh/resources/blog/moveit-transfer-cve-2023-34362-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/moveit-transfer-cve-2023-34362-analysis</guid>
      <pubDate>Thu, 01 Jun 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Securing Your Private Package Registry]]></title>
      <description><![CDATA[Private package registries are high-value targets for supply chain attackers. Here is how to lock them down, from access controls to dependency confusion prevention.]]></description>
      <link>https://safeguard.sh/resources/blog/private-package-registry-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/private-package-registry-security</guid>
      <pubDate>Tue, 30 May 2023 11:00:00 GMT</pubDate>
      <category>How-To Guide</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The Security Implications of Package Bundlers]]></title>
      <description><![CDATA[Bundlers transform your code and dependencies into production artifacts. The security implications of this transformation are significant and widely overlooked.]]></description>
      <link>https://safeguard.sh/resources/blog/security-implications-package-bundlers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-implications-package-bundlers</guid>
      <pubDate>Sun, 28 May 2023 09:00:00 GMT</pubDate>
      <category>AppSec</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Legal Tech Software Security and Compliance Considerations]]></title>
      <description><![CDATA[Law firms and legal tech companies handle privileged data through increasingly complex software. Here's how to manage the software supply chain risk.]]></description>
      <link>https://safeguard.sh/resources/blog/legal-tech-software-security-compliance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/legal-tech-software-security-compliance</guid>
      <pubDate>Thu, 25 May 2023 10:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[TLS Library Comparison: OpenSSL vs BoringSSL vs LibreSSL vs rustls]]></title>
      <description><![CDATA[Your TLS library choice has massive security implications. Here is an honest comparison of the major options and what each trade-off means.]]></description>
      <link>https://safeguard.sh/resources/blog/tls-library-comparison-openssl-boringssl</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/tls-library-comparison-openssl-boringssl</guid>
      <pubDate>Thu, 25 May 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[HIPAA and Software Supply Chain Compliance for Health Tech]]></title>
      <description><![CDATA[HIPAA's Security Rule requires safeguards that extend to software dependencies. Here's what health tech developers and vendors need to address.]]></description>
      <link>https://safeguard.sh/resources/blog/hipaa-software-supply-chain-compliance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/hipaa-software-supply-chain-compliance</guid>
      <pubDate>Thu, 25 May 2023 08:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Developer-Focused Security Awareness for Supply Chain]]></title>
      <description><![CDATA[A supply-chain-specific developer awareness curriculum that replaces generic phishing drills with content engineers actually need, measured by behavior change.]]></description>
      <link>https://safeguard.sh/resources/blog/security-awareness-training-developer-focused-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-awareness-training-developer-focused-supply-chain</guid>
      <pubDate>Mon, 22 May 2023 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Validation and Quality Checks: Ensuring Your SBOMs Are Actually Useful]]></title>
      <description><![CDATA[A syntactically valid SBOM can still be useless. Here's how to validate structure, completeness, and accuracy to produce SBOMs worth trusting.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-validation-quality-checks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-validation-quality-checks</guid>
      <pubDate>Mon, 22 May 2023 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GCP Binary Authorization: Enforcing Container Trust at Deploy Time]]></title>
      <description><![CDATA[A practical walkthrough of Binary Authorization on GKE, from attestor setup to break-glass procedures and CI/CD integration.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-binary-authorization-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-binary-authorization-guide</guid>
      <pubDate>Sat, 20 May 2023 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Malware Detection Techniques for Package Registries]]></title>
      <description><![CDATA[Malicious packages on npm, PyPI, and other registries are surging. Here are the techniques researchers and tools use to detect them.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-malware-detection-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-malware-detection-techniques</guid>
      <pubDate>Sat, 20 May 2023 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Swift Security Analysis Tools: The Current Landscape]]></title>
      <description><![CDATA[Swift's type safety helps, but it does not eliminate all security bugs. Here is the current tooling landscape for finding vulnerabilities in Swift code.]]></description>
      <link>https://safeguard.sh/resources/blog/swift-security-analysis-tools</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/swift-security-analysis-tools</guid>
      <pubDate>Sat, 20 May 2023 10:00:00 GMT</pubDate>
      <category>Secure Development</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Inside the Apache Foundation's Security Practices]]></title>
      <description><![CDATA[The Apache Software Foundation oversees 350+ projects including some of the most widely deployed software on earth. Their security practices set the standard for foundation-governed open source.]]></description>
      <link>https://safeguard.sh/resources/blog/apache-foundation-security-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apache-foundation-security-practices</guid>
      <pubDate>Sat, 20 May 2023 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Serverless Security: Supply Chain Risks in Lambda, Cloud Functions, and Azure Functions]]></title>
      <description><![CDATA[Serverless architectures shift the attack surface from infrastructure to application dependencies. This guide covers the unique supply chain risks of serverless and how to address them.]]></description>
      <link>https://safeguard.sh/resources/blog/serverless-security-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/serverless-security-supply-chain-risks</guid>
      <pubDate>Thu, 18 May 2023 09:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[NIST SSDF v1.1: Practical Adoption Notes]]></title>
      <description><![CDATA[NIST SP 800-218 became the de facto baseline for federal software attestation in 2023. Here is how to adopt SSDF v1.1 without drowning in paperwork.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-ssdf-v1-1-practical-adoption</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-ssdf-v1-1-practical-adoption</guid>
      <pubDate>Mon, 15 May 2023 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Django Security and Supply Chain Guide]]></title>
      <description><![CDATA[Securing Django applications with built-in security features, dependency management, and supply chain protections.]]></description>
      <link>https://safeguard.sh/resources/blog/django-security-supply-chain-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/django-security-supply-chain-guide</guid>
      <pubDate>Mon, 15 May 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Double Extortion Ransomware: How Data Theft Changed the Game]]></title>
      <description><![CDATA[Double extortion transformed ransomware from a reversible nuisance into an irreversible data breach. The evolution from encryption-only to data theft fundamentally changed the threat model.]]></description>
      <link>https://safeguard.sh/resources/blog/double-extortion-ransomware-evolution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/double-extortion-ransomware-evolution</guid>
      <pubDate>Mon, 15 May 2023 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Google Assured Open Source Software: Curated Security for Enterprise Dependencies]]></title>
      <description><![CDATA[Google's Assured OSS service provides enterprise-grade security guarantees for open source packages. It's a compelling model, but it raises questions about who controls the open source supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/google-assured-open-source-software-service</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/google-assured-open-source-software-service</guid>
      <pubDate>Mon, 15 May 2023 10:00:00 GMT</pubDate>
      <category>Tools & Platforms</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Low-Code/No-Code Platforms: The Shadow Supply Chain in Your Organization]]></title>
      <description><![CDATA[Citizen developers are building applications on low-code platforms faster than security teams can assess them. The supply chain risks are real and growing.]]></description>
      <link>https://safeguard.sh/resources/blog/low-code-no-code-platform-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/low-code-no-code-platform-security-risks</guid>
      <pubDate>Mon, 15 May 2023 10:00:00 GMT</pubDate>
      <category>Industry Trends</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Malware Analysis Techniques for Suspicious npm Packages]]></title>
      <description><![CDATA[When an npm package looks suspicious, you need a systematic approach to determine if it is malicious. These analysis techniques separate noise from genuine threats.]]></description>
      <link>https://safeguard.sh/resources/blog/malware-analysis-npm-packages-techniques</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/malware-analysis-npm-packages-techniques</guid>
      <pubDate>Mon, 15 May 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Artifactory Security Best Practices for Enterprise Teams]]></title>
      <description><![CDATA[JFrog Artifactory is a universal artifact manager. Getting its security right requires understanding its permission model, Xray integration, and access token management.]]></description>
      <link>https://safeguard.sh/resources/blog/artifactory-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/artifactory-security-best-practices</guid>
      <pubDate>Fri, 12 May 2023 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Subresource Integrity Failures: When CDN Trust Goes Wrong]]></title>
      <description><![CDATA[SRI protects against CDN compromises and supply chain attacks on client-side scripts. Most web applications do not use it. Here is what they are missing.]]></description>
      <link>https://safeguard.sh/resources/blog/subresource-integrity-failures-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/subresource-integrity-failures-guide</guid>
      <pubDate>Fri, 12 May 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Container Vulnerability Scanning: Comparing the Top Tools in 2023]]></title>
      <description><![CDATA[Not all container scanners are equal. We compared Trivy, Grype, Snyk Container, and others on accuracy, speed, and coverage.]]></description>
      <link>https://safeguard.sh/resources/blog/container-vulnerability-scanning-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-vulnerability-scanning-comparison</guid>
      <pubDate>Wed, 10 May 2023 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Requirements for Financial Services: What You Need to Know]]></title>
      <description><![CDATA[Financial regulators are tightening software transparency requirements. Here's what banks, fintechs, and financial institutions need to know about SBOMs.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-requirements-financial-services</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-requirements-financial-services</guid>
      <pubDate>Wed, 10 May 2023 10:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Elixir and Hex Package Security: Protecting the BEAM Ecosystem]]></title>
      <description><![CDATA[Elixir's Hex package manager serves a smaller but growing ecosystem. Smaller does not mean safer — here is what Elixir teams need to know about dependency security.]]></description>
      <link>https://safeguard.sh/resources/blog/elixir-hex-package-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/elixir-hex-package-security</guid>
      <pubDate>Wed, 10 May 2023 00:00:00 GMT</pubDate>
      <category>Developer Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Snyk vs Sonatype: A Head-to-Head SCA Comparison]]></title>
      <description><![CDATA[We break down the real differences between Snyk and Sonatype for software composition analysis, covering vulnerability detection, developer experience, and pricing.]]></description>
      <link>https://safeguard.sh/resources/blog/snyk-vs-sonatype-comparison-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/snyk-vs-sonatype-comparison-2023</guid>
      <pubDate>Wed, 10 May 2023 00:00:00 GMT</pubDate>
      <category>Tool Comparisons</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Environment Variable Injection in CI/CD Pipelines]]></title>
      <description><![CDATA[Environment variables in CI/CD systems carry secrets, configuration, and control flow. When attackers can inject or modify them, everything breaks.]]></description>
      <link>https://safeguard.sh/resources/blog/environment-variable-injection-ci-cd</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/environment-variable-injection-ci-cd</guid>
      <pubDate>Mon, 08 May 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs for SaaS Products: What Customers Are Starting to Demand]]></title>
      <description><![CDATA[SBOMs were originally for on-premises software. Now SaaS customers are asking for them too. Here is what that means and how to respond.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-saas-products</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-saas-products</guid>
      <pubDate>Mon, 08 May 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[How Google Secures Its Software Supply Chain]]></title>
      <description><![CDATA[An inside look at Google's multi-layered approach to supply chain security, from Binary Authorization to SLSA, and what other organizations can adapt from their model.]]></description>
      <link>https://safeguard.sh/resources/blog/how-google-secures-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-google-secures-software-supply-chain</guid>
      <pubDate>Mon, 08 May 2023 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[MSI Breach: Intel Boot Guard Keys Leaked After Ransomware Attack]]></title>
      <description><![CDATA[The Money Message ransomware gang breached MSI and leaked Intel Boot Guard private keys, undermining firmware security for millions of devices.]]></description>
      <link>https://safeguard.sh/resources/blog/msi-breach-intel-boot-guard-keys-leaked</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/msi-breach-intel-boot-guard-keys-leaked</guid>
      <pubDate>Fri, 05 May 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Business Logic Vulnerabilities: The Flaws Scanners Cannot Find]]></title>
      <description><![CDATA[Business logic vulnerabilities bypass every automated scanner because they are not coding errors. They are design errors. Here is how to identify and prevent them.]]></description>
      <link>https://safeguard.sh/resources/blog/business-logic-vulnerabilities-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/business-logic-vulnerabilities-guide</guid>
      <pubDate>Fri, 05 May 2023 09:00:00 GMT</pubDate>
      <category>AppSec</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[SLSA v1.0: Supply-chain Levels for Software Artifacts Reaches Maturity]]></title>
      <description><![CDATA[SLSA v1.0 simplifies the framework and makes it practical to adopt. Here's what changed and how to implement it.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-levels-for-software-artifacts-slsa-v1</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-levels-for-software-artifacts-slsa-v1</guid>
      <pubDate>Mon, 01 May 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[The Security Implications of Semantic Versioning]]></title>
      <description><![CDATA[Semver promises predictability in dependency management. In practice, it creates a trust model with serious security implications that most developers do not consider.]]></description>
      <link>https://safeguard.sh/resources/blog/semantic-versioning-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/semantic-versioning-security-implications</guid>
      <pubDate>Fri, 28 Apr 2023 09:00:00 GMT</pubDate>
      <category>Dependency Management</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[CISA KEV Catalog: One Year Analysis of Known Exploited Vulnerabilities]]></title>
      <description><![CDATA[After one year, the CISA KEV catalog has reshaped how organizations prioritize patching. Here's what the data tells us about real-world exploitation.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-kev-catalog-one-year-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-kev-catalog-one-year-analysis</guid>
      <pubDate>Tue, 25 Apr 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Post-Breach Supply Chain Hardening: Lessons from Real Incidents]]></title>
      <description><![CDATA[After a supply chain breach, the remediation window is your best opportunity to implement controls that should have existed before the incident. This guide covers what to harden and in what order.]]></description>
      <link>https://safeguard.sh/resources/blog/post-breach-supply-chain-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/post-breach-supply-chain-hardening</guid>
      <pubDate>Sat, 22 Apr 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[CISA Secure by Design Principles: What They Mean for Software Teams]]></title>
      <description><![CDATA[CISA's Secure by Design initiative shifts security responsibility from users to manufacturers. Here's what it means for how you build software.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-secure-by-design-principles</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-secure-by-design-principles</guid>
      <pubDate>Thu, 20 Apr 2023 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[PaperCut CVE-2023-27350: When Print Management Software Becomes a Ransomware Gateway]]></title>
      <description><![CDATA[CVE-2023-27350 in PaperCut NG/MF allowed unauthenticated RCE through the print management server. Cl0p and LockBit ransomware groups jumped on it within days.]]></description>
      <link>https://safeguard.sh/resources/blog/papercut-cve-2023-27350-rce-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/papercut-cve-2023-27350-rce-exploitation</guid>
      <pubDate>Wed, 19 Apr 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How to Pin GitHub Actions to SHAs Correctly]]></title>
      <description><![CDATA[A hands-on guide to pinning every third-party GitHub Action to a full commit SHA, automating updates with Dependabot, and avoiding the common pitfalls.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-pin-github-actions-to-shas-correctly</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-pin-github-actions-to-shas-correctly</guid>
      <pubDate>Tue, 18 Apr 2023 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GitLab CI/CD Security Configuration]]></title>
      <description><![CDATA[Hardening GitLab CI/CD pipelines with protected variables, secure runners, and built-in security scanning.]]></description>
      <link>https://safeguard.sh/resources/blog/gitlab-cicd-security-configuration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gitlab-cicd-security-configuration</guid>
      <pubDate>Tue, 18 Apr 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Intelligence (OSINT) for Supply Chain Security]]></title>
      <description><![CDATA[How OSINT techniques can uncover supply chain threats hiding in plain sight—from compromised packages to suspicious maintainer activity.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-intelligence-osint-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-intelligence-osint-supply-chain</guid>
      <pubDate>Tue, 18 Apr 2023 00:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Maven Plugin Verification: Trusting Your Build-Time Dependencies]]></title>
      <description><![CDATA[Maven plugins execute during your build with full system access. Verifying them is harder than verifying runtime dependencies, and most teams skip it.]]></description>
      <link>https://safeguard.sh/resources/blog/maven-plugin-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maven-plugin-verification</guid>
      <pubDate>Sat, 15 Apr 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[npm Manifest Confusion: The Hidden Vulnerability in Every Node.js Project]]></title>
      <description><![CDATA[A fundamental flaw in npm's package handling allowed published package metadata to differ from actual package contents, undermining trust in the entire ecosystem.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-manifest-confusion-vulnerability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-manifest-confusion-vulnerability</guid>
      <pubDate>Sat, 15 Apr 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Choosing Between SCA Tools in 2023]]></title>
      <description><![CDATA[A no-nonsense comparison of software composition analysis tools to help you pick the right one for your team's needs, budget, and workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/choosing-between-sca-tools-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/choosing-between-sca-tools-2023</guid>
      <pubDate>Sat, 15 Apr 2023 09:00:00 GMT</pubDate>
      <category>Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Black Duck SCA: The Enterprise Stalwart of Open Source Security]]></title>
      <description><![CDATA[A review of Synopsys Black Duck for software composition analysis, covering its strengths in license compliance, vulnerability detection, and enterprise governance.]]></description>
      <link>https://safeguard.sh/resources/blog/black-duck-software-composition-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/black-duck-software-composition-analysis</guid>
      <pubDate>Sat, 15 Apr 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[A Taxonomy of Open Source Supply Chain Attacks]]></title>
      <description><![CDATA[Supply chain attacks on open source come in distinct flavors. Understanding the taxonomy helps defenders prioritize controls and recognize threats before they reach production.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-supply-chain-attack-taxonomy</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-supply-chain-attack-taxonomy</guid>
      <pubDate>Sat, 15 Apr 2023 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Software Escrow and Supply Chain Continuity Planning]]></title>
      <description><![CDATA[What happens when a critical vendor disappears? Software escrow arrangements protect your business continuity, but most organizations get the implementation wrong.]]></description>
      <link>https://safeguard.sh/resources/blog/software-escrow-supply-chain-continuity</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-escrow-supply-chain-continuity</guid>
      <pubDate>Wed, 12 Apr 2023 11:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Calico Network Policy Best Practices for Production Kubernetes]]></title>
      <description><![CDATA[Calico is the most widely deployed Kubernetes network plugin. Its policy model is powerful but has gotchas that trip up even experienced teams.]]></description>
      <link>https://safeguard.sh/resources/blog/calico-network-policy-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/calico-network-policy-best-practices</guid>
      <pubDate>Wed, 12 Apr 2023 10:00:00 GMT</pubDate>
      <category>Kubernetes Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The Shared Responsibility Model for Software Supply Chain Security]]></title>
      <description><![CDATA[Cloud providers defined the shared responsibility model for infrastructure. Software supply chains need the same clarity about who is responsible for what.]]></description>
      <link>https://safeguard.sh/resources/blog/shared-responsibility-model-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/shared-responsibility-model-supply-chain</guid>
      <pubDate>Wed, 12 Apr 2023 10:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Software Heritage and the Case for Source Code Preservation]]></title>
      <description><![CDATA[Software Heritage archives the world's source code. Here is why that matters for supply chain security, reproducibility, and long-term software integrity.]]></description>
      <link>https://safeguard.sh/resources/blog/software-heritage-archive-preservation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-heritage-archive-preservation</guid>
      <pubDate>Sat, 08 Apr 2023 11:00:00 GMT</pubDate>
      <category>Open Source</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Post-Install Hooks in Package Managers: The Universal Backdoor Mechanism]]></title>
      <description><![CDATA[Almost every package manager supports post-install hooks that run arbitrary code. This is the most abused feature in supply chain attacks.]]></description>
      <link>https://safeguard.sh/resources/blog/post-install-hooks-package-managers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/post-install-hooks-package-managers</guid>
      <pubDate>Sat, 08 Apr 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Software Attestation in Practice: From Theory to Implementation]]></title>
      <description><![CDATA[Software attestation is moving from academic concept to practical requirement. Here's how to implement it in your build pipelines today.]]></description>
      <link>https://safeguard.sh/resources/blog/software-attestation-in-practice</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-attestation-in-practice</guid>
      <pubDate>Sat, 08 Apr 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Measuring Security Program Effectiveness]]></title>
      <description><![CDATA[Beyond vulnerability counts: practical metrics and measurement frameworks that actually tell you whether your security program is working.]]></description>
      <link>https://safeguard.sh/resources/blog/measuring-security-program-effectiveness</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/measuring-security-program-effectiveness</guid>
      <pubDate>Sat, 08 Apr 2023 00:00:00 GMT</pubDate>
      <category>Organizational Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[3CX Desktop App: Anatomy of a Cascading Breach]]></title>
      <description><![CDATA[How a Trading Technologies installer from 2022 poisoned the 3CX build pipeline in 2023, producing the first publicly confirmed cascading supply chain attack.]]></description>
      <link>https://safeguard.sh/resources/blog/3cx-desktop-app-cascading-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/3cx-desktop-app-cascading-breach</guid>
      <pubDate>Wed, 05 Apr 2023 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Chaos Engineering for Supply Chain Resilience: Breaking Your Build to Make It Stronger]]></title>
      <description><![CDATA[Chaos engineering principles applied to the software supply chain reveal hidden dependencies, single points of failure, and degradation paths that only surface under stress.]]></description>
      <link>https://safeguard.sh/resources/blog/chaos-engineering-supply-chain-resilience</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chaos-engineering-supply-chain-resilience</guid>
      <pubDate>Wed, 05 Apr 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Modern Command Injection Prevention: Beyond the Basics]]></title>
      <description><![CDATA[Command injection remains in the OWASP Top 10 because developers keep making the same mistakes with new tools. Here is a modern prevention guide covering containers, serverless, and CI/CD.]]></description>
      <link>https://safeguard.sh/resources/blog/command-injection-prevention-modern</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/command-injection-prevention-modern</guid>
      <pubDate>Wed, 05 Apr 2023 09:00:00 GMT</pubDate>
      <category>AppSec</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Running Containers in Rootless Mode: A Practical Security Guide]]></title>
      <description><![CDATA[Root in the container often means root on the host. Rootless mode breaks that assumption. Here is how to run Docker and Podman without root and why it matters more than you think.]]></description>
      <link>https://safeguard.sh/resources/blog/container-rootless-mode-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-rootless-mode-security-guide</guid>
      <pubDate>Wed, 05 Apr 2023 00:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Startup Security at Growth Stage: Building Enterprise-Grade Programs]]></title>
      <description><![CDATA[Post-Series B, your startup is becoming an enterprise. Security programs that worked for 30 engineers will not work for 300. Here is how to build security that scales with your ambitions.]]></description>
      <link>https://safeguard.sh/resources/blog/startup-security-growth-stage-enterprise</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/startup-security-growth-stage-enterprise</guid>
      <pubDate>Wed, 05 Apr 2023 00:00:00 GMT</pubDate>
      <category>Startup Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[3CX Attack Lessons: What Every Software Vendor Must Do Differently]]></title>
      <description><![CDATA[The 3CX supply chain attack exposed critical gaps in how software vendors protect their build pipelines. Here are the concrete lessons.]]></description>
      <link>https://safeguard.sh/resources/blog/3cx-attack-lessons-for-software-vendors</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/3cx-attack-lessons-for-software-vendors</guid>
      <pubDate>Sun, 02 Apr 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[3CX Supply Chain Attack: A Deep Dive into the North Korean Compromise]]></title>
      <description><![CDATA[The 3CX supply chain attack was a multi-stage operation linked to North Korea's Lazarus Group. Here's the full technical breakdown.]]></description>
      <link>https://safeguard.sh/resources/blog/3cx-supply-chain-attack-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/3cx-supply-chain-attack-analysis</guid>
      <pubDate>Wed, 29 Mar 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[The March 2023 PyPI Malware Wave]]></title>
      <description><![CDATA[PyPI paused new user registration for most of May 20-23 after a March wave of typosquats and info-stealers flooded the index. Here is what happened and why.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-malware-wave-march-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-malware-wave-march-2023</guid>
      <pubDate>Tue, 28 Mar 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FISMA and Federal Software Security: Supply Chain Requirements Explained]]></title>
      <description><![CDATA[FISMA's authorization framework creates strict requirements for software in federal systems. Here's how supply chain security fits into the ATO process.]]></description>
      <link>https://safeguard.sh/resources/blog/fisma-federal-software-security-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fisma-federal-software-security-requirements</guid>
      <pubDate>Tue, 28 Mar 2023 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Azure Container Registry Security: Locking Down Your Image Pipeline]]></title>
      <description><![CDATA[How to secure Azure Container Registry with network isolation, content trust, and Microsoft Defender for Containers integration.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-container-registry-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-container-registry-security</guid>
      <pubDate>Sat, 25 Mar 2023 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[OpenAI ChatGPT Data Breach March 2023: What Was Exposed]]></title>
      <description><![CDATA[A bug in ChatGPT exposed user chat histories and payment information. Here's what happened and what it means for AI service security.]]></description>
      <link>https://safeguard.sh/resources/blog/openai-chatgpt-data-breach-march-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openai-chatgpt-data-breach-march-2023</guid>
      <pubDate>Fri, 24 Mar 2023 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Threat Modeling the Software Supply Chain]]></title>
      <description><![CDATA[Traditional threat modeling focuses on your code. Supply chain threat modeling extends to every tool, dependency, and process that touches your software. Here is how to do it systematically.]]></description>
      <link>https://safeguard.sh/resources/blog/threat-modeling-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/threat-modeling-software-supply-chain</guid>
      <pubDate>Wed, 22 Mar 2023 11:00:00 GMT</pubDate>
      <category>Threat Modeling</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GitLab CI Security Scanning Setup]]></title>
      <description><![CDATA[Step-by-step guide to enabling SAST, DAST, dependency scanning, and container scanning in GitLab CI pipelines.]]></description>
      <link>https://safeguard.sh/resources/blog/gitlab-ci-security-scanning-setup</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gitlab-ci-security-scanning-setup</guid>
      <pubDate>Wed, 22 Mar 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Quantifying Security Debt: Methods That Actually Work]]></title>
      <description><![CDATA[Everyone talks about security debt. Almost nobody measures it. Here are practical methods for putting numbers on the security shortcuts your organization has accumulated.]]></description>
      <link>https://safeguard.sh/resources/blog/security-debt-quantification-methods</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-debt-quantification-methods</guid>
      <pubDate>Wed, 22 Mar 2023 00:00:00 GMT</pubDate>
      <category>Security Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[AI-Generated Code Security Risks: Copilot, ChatGPT, and the New Attack Surface]]></title>
      <description><![CDATA[AI code assistants are writing a growing share of production code. The security implications are significant and largely unaddressed.]]></description>
      <link>https://safeguard.sh/resources/blog/ai-generated-code-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ai-generated-code-security-risks</guid>
      <pubDate>Mon, 20 Mar 2023 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Cross-Language Dependency Analysis: Bridging npm, pip, Maven, and Beyond]]></title>
      <description><![CDATA[Modern applications use multiple languages and package ecosystems. Analyzing dependencies across these boundaries requires techniques that single-ecosystem tools cannot provide.]]></description>
      <link>https://safeguard.sh/resources/blog/cross-language-dependency-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cross-language-dependency-analysis</guid>
      <pubDate>Sat, 18 Mar 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Go Module Checksum Database: How It Secures Your Dependencies]]></title>
      <description><![CDATA[Go checksum database is one of the most underappreciated supply chain security features in any language ecosystem. Here is how it works and where it falls short.]]></description>
      <link>https://safeguard.sh/resources/blog/go-module-checksum-database-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-module-checksum-database-security</guid>
      <pubDate>Sat, 18 Mar 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cross-Functional Security Collaboration]]></title>
      <description><![CDATA[Security isn't just the security team's problem. Building effective collaboration between security, engineering, product, and operations is essential for supply chain defense.]]></description>
      <link>https://safeguard.sh/resources/blog/cross-functional-security-collaboration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cross-functional-security-collaboration</guid>
      <pubDate>Sat, 18 Mar 2023 00:00:00 GMT</pubDate>
      <category>Security Culture</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Dynamic Application Security Testing: A Practitioner's Guide to DAST Done Right]]></title>
      <description><![CDATA[DAST finds what source code analysis cannot. Here is how to set it up, tune it, and actually get value from it in a modern CI/CD pipeline.]]></description>
      <link>https://safeguard.sh/resources/blog/dynamic-application-security-testing-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dynamic-application-security-testing-guide</guid>
      <pubDate>Sat, 18 Mar 2023 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Ruby Brakeman Security Scanner: Rails-Aware Vulnerability Detection]]></title>
      <description><![CDATA[Brakeman understands Rails conventions and catches security issues that generic scanners miss. Here is how to use it effectively.]]></description>
      <link>https://safeguard.sh/resources/blog/ruby-brakeman-security-scanner</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ruby-brakeman-security-scanner</guid>
      <pubDate>Wed, 15 Mar 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Understanding EPSS: Exploit Prediction Scoring System Explained]]></title>
      <description><![CDATA[EPSS offers a data-driven approach to vulnerability prioritization. Learn how it works, how it compares to CVSS, and why your team should care.]]></description>
      <link>https://safeguard.sh/resources/blog/understanding-epss-exploit-prediction-scoring</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/understanding-epss-exploit-prediction-scoring</guid>
      <pubDate>Wed, 15 Mar 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Web3 Smart Contract Dependencies: A Supply Chain Security Blind Spot]]></title>
      <description><![CDATA[Smart contracts import code from unaudited libraries, creating supply chain risks that have already led to billions in losses. The Web3 ecosystem needs better tooling.]]></description>
      <link>https://safeguard.sh/resources/blog/web3-smart-contract-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/web3-smart-contract-supply-chain-security</guid>
      <pubDate>Wed, 15 Mar 2023 08:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Chrome Extension Manifest V3: What It Means for Browser Supply Chain Security]]></title>
      <description><![CDATA[Chrome's Manifest V3 restricts extension capabilities in the name of security. The changes help, but they do not solve the browser extension supply chain problem.]]></description>
      <link>https://safeguard.sh/resources/blog/chrome-extension-manifest-v3-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chrome-extension-manifest-v3-security</guid>
      <pubDate>Wed, 15 Mar 2023 00:00:00 GMT</pubDate>
      <category>Browser Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Go Modules Checksum Database: Five Years In]]></title>
      <description><![CDATA[sum.golang.org went public in August 2019. After four years of production, here is what the Go checksum database got right and what it did not.]]></description>
      <link>https://safeguard.sh/resources/blog/go-modules-checksum-database-five-years-in</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/go-modules-checksum-database-five-years-in</guid>
      <pubDate>Sun, 12 Mar 2023 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[DDoS Protection for Software Distribution Infrastructure]]></title>
      <description><![CDATA[Package registries, artifact repositories, and update servers are high-value DDoS targets. Taking them down disrupts entire software supply chains.]]></description>
      <link>https://safeguard.sh/resources/blog/ddos-protection-software-distribution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ddos-protection-software-distribution</guid>
      <pubDate>Sun, 12 Mar 2023 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Service Mesh mTLS Configuration: Getting Mutual TLS Right]]></title>
      <description><![CDATA[Service meshes promise automatic mTLS. The reality involves permissive modes, certificate management complexity, and gaps that attackers can exploit.]]></description>
      <link>https://safeguard.sh/resources/blog/service-mesh-mtls-configuration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/service-mesh-mtls-configuration</guid>
      <pubDate>Sun, 12 Mar 2023 10:00:00 GMT</pubDate>
      <category>Kubernetes Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[BuildKit and Buildah: Building Containers Without Giving Away the Keys]]></title>
      <description><![CDATA[Container build tools have direct access to your source code, secrets, and registries. BuildKit and Buildah offer security features that most teams ignore. Here is what to use and why.]]></description>
      <link>https://safeguard.sh/resources/blog/buildkit-buildah-secure-container-builds</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/buildkit-buildah-secure-container-builds</guid>
      <pubDate>Sun, 12 Mar 2023 00:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Security Code Review Best Practices]]></title>
      <description><![CDATA[How to make code reviews an effective security checkpoint without turning every PR into a week-long security audit.]]></description>
      <link>https://safeguard.sh/resources/blog/security-code-review-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-code-review-best-practices</guid>
      <pubDate>Fri, 10 Mar 2023 11:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Private RSA Key Exposed in Public Repository]]></title>
      <description><![CDATA[GitHub's accidental exposure of its private RSA SSH host key in a public repository forced an emergency rotation affecting millions of developers.]]></description>
      <link>https://safeguard.sh/resources/blog/github-private-rsa-key-exposed-in-repository</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-private-rsa-key-exposed-in-repository</guid>
      <pubDate>Fri, 10 Mar 2023 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Code Signing Certificates and Software Supply Chain Integrity]]></title>
      <description><![CDATA[Code signing is a critical trust anchor in the software supply chain. This guide covers how it works, how it fails, and how to implement it correctly.]]></description>
      <link>https://safeguard.sh/resources/blog/code-signing-certificates-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/code-signing-certificates-supply-chain</guid>
      <pubDate>Wed, 08 Mar 2023 11:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Fortinet FortiProxy CVE-2023-25610: Buffer Underwrite in Network Security Infrastructure]]></title>
      <description><![CDATA[CVE-2023-25610 allowed unauthenticated RCE on FortiOS and FortiProxy through a buffer underwrite vulnerability. Another critical flaw in perimeter security appliances.]]></description>
      <link>https://safeguard.sh/resources/blog/fortinet-fortiproxy-cve-2023-25610</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fortinet-fortiproxy-cve-2023-25610</guid>
      <pubDate>Wed, 08 Mar 2023 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Git Credential Security for Organizations: Locking Down Source Access]]></title>
      <description><![CDATA[Git credentials are the keys to your source code. Here is how organizations should manage them to prevent unauthorized access and credential theft.]]></description>
      <link>https://safeguard.sh/resources/blog/git-credential-security-organizations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/git-credential-security-organizations</guid>
      <pubDate>Wed, 08 Mar 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Java Maven and Gradle Dependency Security]]></title>
      <description><![CDATA[How to secure your Java dependency chain across Maven and Gradle builds, from signature verification to repository management.]]></description>
      <link>https://safeguard.sh/resources/blog/java-maven-gradle-dependency-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/java-maven-gradle-dependency-security</guid>
      <pubDate>Wed, 08 Mar 2023 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Email Security and Supply Chain Phishing Attacks]]></title>
      <description><![CDATA[Phishing remains the top initial access vector for supply chain attacks. Targeted emails against developers, maintainers, and DevOps engineers open the door to code injection, credential theft, and pipeline compromise.]]></description>
      <link>https://safeguard.sh/resources/blog/email-security-supply-chain-phishing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/email-security-supply-chain-phishing</guid>
      <pubDate>Wed, 08 Mar 2023 00:00:00 GMT</pubDate>
      <category>Social Engineering</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes RBAC Security Best Practices for Supply Chain Protection]]></title>
      <description><![CDATA[Misconfigured Kubernetes RBAC is a common path to supply chain compromise. Here's how to lock down permissions in your clusters.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-rbac-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-rbac-security-best-practices</guid>
      <pubDate>Sun, 05 Mar 2023 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Maven Dependency Resolution Attacks: Exploiting Java's Build System]]></title>
      <description><![CDATA[Maven's dependency resolution mechanism can be exploited through repository poisoning, dependency confusion, and POM manipulation. Here is what Java teams need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/maven-dependency-resolution-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maven-dependency-resolution-attacks</guid>
      <pubDate>Sun, 05 Mar 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PWA Service Worker Attack Surface: What Security Teams Overlook]]></title>
      <description><![CDATA[Service workers give Progressive Web Apps powerful offline and caching capabilities, but they also create a persistent attack surface that outlives the browser tab. Understanding this surface is critical.]]></description>
      <link>https://safeguard.sh/resources/blog/pwa-service-worker-attack-surface</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pwa-service-worker-attack-surface</guid>
      <pubDate>Sun, 05 Mar 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Automating Typosquatting Detection for Package Registries]]></title>
      <description><![CDATA[Typosquatting remains one of the most effective supply chain attacks. Automated detection using string distance algorithms, behavioral analysis, and registry monitoring can catch malicious packages before they reach your builds.]]></description>
      <link>https://safeguard.sh/resources/blog/typosquatting-detection-automation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/typosquatting-detection-automation</guid>
      <pubDate>Sun, 05 Mar 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Australia's Critical Infrastructure Security Act and Software Supply Chain Risk]]></title>
      <description><![CDATA[Australia's SOCI Act imposes strict cybersecurity obligations on critical infrastructure. Here's what software suppliers need to understand.]]></description>
      <link>https://safeguard.sh/resources/blog/australia-critical-infrastructure-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/australia-critical-infrastructure-security</guid>
      <pubDate>Sun, 05 Mar 2023 07:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Setting Up Continuous Dependency Monitoring From Scratch]]></title>
      <description><![CDATA[Point-in-time dependency scans miss vulnerabilities disclosed between scans. Here is how to set up continuous monitoring that catches new threats as they emerge.]]></description>
      <link>https://safeguard.sh/resources/blog/continuous-dependency-monitoring-setup</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/continuous-dependency-monitoring-setup</guid>
      <pubDate>Tue, 28 Feb 2023 09:00:00 GMT</pubDate>
      <category>Dependency Management</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[GitLab Ultimate Security Features: Built-In Security Done Pragmatically]]></title>
      <description><![CDATA[A review of GitLab Ultimate's security scanning features covering SAST, DAST, dependency scanning, container scanning, and how integrated security compares to best-of-breed tools.]]></description>
      <link>https://safeguard.sh/resources/blog/gitlab-ultimate-security-features-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gitlab-ultimate-security-features-review</guid>
      <pubDate>Tue, 28 Feb 2023 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Swift CocoaPods and SPM Security]]></title>
      <description><![CDATA[Securing iOS and macOS dependencies with Swift Package Manager and CocoaPods, including checksum verification and source control.]]></description>
      <link>https://safeguard.sh/resources/blog/swift-cocoapods-spm-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/swift-cocoapods-spm-security</guid>
      <pubDate>Sat, 25 Feb 2023 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Spinnaker Deployment Security]]></title>
      <description><![CDATA[Securing Spinnaker's multi-cloud deployment pipelines with authentication, authorization, pipeline constraints, and artifact verification.]]></description>
      <link>https://safeguard.sh/resources/blog/spinnaker-deployment-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spinnaker-deployment-security</guid>
      <pubDate>Sat, 25 Feb 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Securing GCP Artifact Registry: A Complete Guide]]></title>
      <description><![CDATA[How to configure GCP Artifact Registry for security-first container and package management, from IAM policies to vulnerability scanning.]]></description>
      <link>https://safeguard.sh/resources/blog/gcp-artifact-registry-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gcp-artifact-registry-security-guide</guid>
      <pubDate>Wed, 22 Feb 2023 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Requirements for Medical Devices: FDA's New Mandate]]></title>
      <description><![CDATA[The FDA now requires software bill of materials for medical device submissions. Here's what manufacturers need to know about compliance.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-requirements-for-medical-devices-fda</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-requirements-for-medical-devices-fda</guid>
      <pubDate>Mon, 20 Feb 2023 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[gosec: Static Analysis for Go Security]]></title>
      <description><![CDATA[gosec is the standard security linter for Go. Here is what it catches, what it misses, and how to integrate it effectively into your workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/gosec-static-analysis-go-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gosec-static-analysis-go-security</guid>
      <pubDate>Sat, 18 Feb 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Jira Service Management CVE-2023-22501: Broken Authentication Exposes Enterprise Workflows]]></title>
      <description><![CDATA[A critical authentication vulnerability in Jira Service Management allowed attackers to impersonate users and gain access to sensitive service desk instances. The flaw bypassed email verification controls.]]></description>
      <link>https://safeguard.sh/resources/blog/jira-service-management-cve-2023-22501</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jira-service-management-cve-2023-22501</guid>
      <pubDate>Wed, 15 Feb 2023 12:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Sharing and Distribution Best Practices]]></title>
      <description><![CDATA[Generating SBOMs is only half the battle. Sharing them securely and effectively with stakeholders requires careful planning and tooling.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-sharing-and-distribution-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-sharing-and-distribution-best-practices</guid>
      <pubDate>Wed, 15 Feb 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Defense in Depth for the Software Supply Chain]]></title>
      <description><![CDATA[No single control stops supply chain attacks. Defense in depth — layered controls across the entire software lifecycle — is the only strategy that works against sophisticated adversaries.]]></description>
      <link>https://safeguard.sh/resources/blog/defense-in-depth-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/defense-in-depth-software-supply-chain</guid>
      <pubDate>Wed, 15 Feb 2023 00:00:00 GMT</pubDate>
      <category>Security Architecture</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Alpine APK Security Model: Small Footprint, Big Trust Decisions]]></title>
      <description><![CDATA[Alpine Linux is the default choice for minimal containers. Its APK package manager has a different security model than apt or dnf, and the tradeoffs matter.]]></description>
      <link>https://safeguard.sh/resources/blog/alpine-apk-security-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/alpine-apk-security-model</guid>
      <pubDate>Sun, 12 Feb 2023 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Android APK Supply Chain Verification: Beyond Play Protect]]></title>
      <description><![CDATA[Google Play Protect scans for malware, but it does not verify supply chain integrity. Here is how to verify that the APKs on your devices are what you expect.]]></description>
      <link>https://safeguard.sh/resources/blog/android-apk-supply-chain-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/android-apk-supply-chain-verification</guid>
      <pubDate>Sun, 12 Feb 2023 10:00:00 GMT</pubDate>
      <category>Mobile Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[CDN Poisoning Attacks: How Cached Content Becomes a Weapon]]></title>
      <description><![CDATA[CDN cache poisoning turns your performance infrastructure into an attack vector. When the cache serves malicious content to every user, the blast radius is massive and immediate.]]></description>
      <link>https://safeguard.sh/resources/blog/cdn-poisoning-attacks-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cdn-poisoning-attacks-prevention</guid>
      <pubDate>Sun, 12 Feb 2023 00:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Cross-Site Scripting (XSS) Prevention: Context-Aware Encoding and Modern Defenses]]></title>
      <description><![CDATA[XSS remains a top web vulnerability because output encoding is context-dependent. Here is how to get it right across HTML, JavaScript, URL, and CSS contexts.]]></description>
      <link>https://safeguard.sh/resources/blog/cross-site-scripting-xss-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cross-site-scripting-xss-prevention</guid>
      <pubDate>Sun, 12 Feb 2023 00:00:00 GMT</pubDate>
      <category>Code Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOMs for Serverless Applications: What Changes and What Doesn't]]></title>
      <description><![CDATA[Serverless doesn't mean dependency-free. Here's how to generate and manage SBOMs for Lambda functions, Azure Functions, and Cloud Functions.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-for-serverless-applications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-for-serverless-applications</guid>
      <pubDate>Sun, 12 Feb 2023 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Mandatory 2FA for Critical Packages: A Turning Point for Python Security]]></title>
      <description><![CDATA[PyPI's decision to require two-factor authentication for critical package maintainers marks a significant step toward securing the Python supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-mandatory-2fa-for-critical-packages</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-mandatory-2fa-for-critical-packages</guid>
      <pubDate>Fri, 10 Feb 2023 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Cybersecurity Budget Planning: A Practical Guide for Security Leaders]]></title>
      <description><![CDATA[Budget season is every security leader's least favorite time. Here is how to build a cybersecurity budget that gets approved and actually protects the organization.]]></description>
      <link>https://safeguard.sh/resources/blog/cybersecurity-budget-planning-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cybersecurity-budget-planning-guide</guid>
      <pubDate>Wed, 08 Feb 2023 10:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[GoAnywhere MFT Zero-Day (CVE-2023-0669): Clop Ransomware's File Transfer Rampage]]></title>
      <description><![CDATA[The Clop ransomware gang exploited a pre-auth RCE in GoAnywhere MFT to breach over 130 organizations. The campaign foreshadowed their devastating MOVEit attack months later.]]></description>
      <link>https://safeguard.sh/resources/blog/goanywhere-mft-cve-2023-0669-clop</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/goanywhere-mft-cve-2023-0669-clop</guid>
      <pubDate>Mon, 06 Feb 2023 09:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Session Management Security: A Complete Guide]]></title>
      <description><![CDATA[Session management vulnerabilities enable account takeover, privilege escalation, and data theft. This guide covers session ID generation, storage, lifecycle, and the attacks that exploit weak session handling.]]></description>
      <link>https://safeguard.sh/resources/blog/session-management-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/session-management-security-guide</guid>
      <pubDate>Sun, 05 Feb 2023 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[VPN Security for Remote Development Teams: Beyond the Basics]]></title>
      <description><![CDATA[Remote development teams depend on VPNs, but misconfigured VPNs create supply chain risks. Split tunneling, credential management, and endpoint security all affect build pipeline integrity.]]></description>
      <link>https://safeguard.sh/resources/blog/vpn-security-remote-development-teams</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vpn-security-remote-development-teams</guid>
      <pubDate>Sun, 05 Feb 2023 10:00:00 GMT</pubDate>
      <category>Network Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[ESLint Supply Chain Attack: Malicious npm Packages Targeting Developers]]></title>
      <description><![CDATA[Attackers published malicious packages impersonating ESLint on npm, exploiting developer trust in the popular linting tool to steal credentials.]]></description>
      <link>https://safeguard.sh/resources/blog/eslint-supply-chain-attack-npm-packages</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eslint-supply-chain-attack-npm-packages</guid>
      <pubDate>Fri, 03 Feb 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Fork Maintenance and Your Security Responsibilities]]></title>
      <description><![CDATA[Forking an open source project means inheriting its security obligations. Here is what organizations need to know before and after forking a dependency.]]></description>
      <link>https://safeguard.sh/resources/blog/fork-maintenance-security-responsibilities</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fork-maintenance-security-responsibilities</guid>
      <pubDate>Sat, 28 Jan 2023 09:00:00 GMT</pubDate>
      <category>Dependency Management</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Pinning vs. Ranges: The Tradeoffs]]></title>
      <description><![CDATA[Should you pin exact dependency versions or use ranges? The answer is more nuanced than most teams think, and getting it wrong has real security implications.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-pinning-vs-ranges-tradeoffs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-pinning-vs-ranges-tradeoffs</guid>
      <pubDate>Wed, 25 Jan 2023 14:00:00 GMT</pubDate>
      <category>Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GitHub RSA SSH Key Rotation Incident: Why It Mattered]]></title>
      <description><![CDATA[GitHub rotated its RSA SSH host key after accidental exposure. A small mistake with major supply chain implications for every Git-based workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/github-rsa-ssh-key-rotation-incident</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-rsa-ssh-key-rotation-incident</guid>
      <pubDate>Wed, 25 Jan 2023 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Dependabot vs Renovate: Which Dependency Update Bot Should You Use?]]></title>
      <description><![CDATA[A practical guide comparing Dependabot and Renovate for automated dependency updates, covering configuration flexibility, ecosystem support, and team workflows.]]></description>
      <link>https://safeguard.sh/resources/blog/dependabot-renovate-comparison-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependabot-renovate-comparison-guide</guid>
      <pubDate>Wed, 25 Jan 2023 00:00:00 GMT</pubDate>
      <category>Tool Comparisons</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cryptographic Library Selection Guide: Choosing Wisely for Your Stack]]></title>
      <description><![CDATA[Picking the wrong crypto library means either rolling your own crypto or using a library with a poor security track record. Here is how to choose.]]></description>
      <link>https://safeguard.sh/resources/blog/cryptographic-library-selection-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cryptographic-library-selection-guide</guid>
      <pubDate>Sun, 22 Jan 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Royal Ransomware: Why Healthcare Became the Primary Target]]></title>
      <description><![CDATA[Royal ransomware emerged from the ashes of Conti to become one of the most aggressive operations targeting healthcare organizations in 2022 and 2023.]]></description>
      <link>https://safeguard.sh/resources/blog/royal-ransomware-healthcare-targeting</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/royal-ransomware-healthcare-targeting</guid>
      <pubDate>Sun, 22 Jan 2023 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Securing AI/ML Pipelines: The Supply Chain You're Not Watching]]></title>
      <description><![CDATA[AI/ML pipelines introduce unique supply chain risks from training data to model distribution. Most organizations have zero visibility into this attack surface.]]></description>
      <link>https://safeguard.sh/resources/blog/securing-ai-ml-pipelines-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/securing-ai-ml-pipelines-supply-chain</guid>
      <pubDate>Fri, 20 Jan 2023 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[T-Mobile API Breach: 37 Million Records Stolen Through an Unsecured API]]></title>
      <description><![CDATA[In January 2023, T-Mobile disclosed that an attacker exploited an API to steal personal data of 37 million customers. It was their ninth major breach in five years.]]></description>
      <link>https://safeguard.sh/resources/blog/t-mobile-breach-2022-api-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/t-mobile-breach-2022-api-exploitation</guid>
      <pubDate>Thu, 19 Jan 2023 11:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Format Conversion: Tools and Techniques]]></title>
      <description><![CDATA[Your supplier sends SPDX, your platform expects CycloneDX. Here's how to convert between SBOM formats without losing critical data.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-format-conversion-tools</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-format-conversion-tools</guid>
      <pubDate>Wed, 18 Jan 2023 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Azure Defender for Containers: Getting Real Security Value]]></title>
      <description><![CDATA[How to configure and operationalize Microsoft Defender for Containers for ACR scanning, AKS runtime protection, and CI/CD integration.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-defender-for-containers-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-defender-for-containers-guide</guid>
      <pubDate>Sun, 15 Jan 2023 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[ChatGPT and AI Security Implications for Software Supply Chains]]></title>
      <description><![CDATA[The explosion of AI tools like ChatGPT is reshaping how developers write code — and introducing new supply chain risks that most teams aren't thinking about.]]></description>
      <link>https://safeguard.sh/resources/blog/chatgpt-ai-security-implications-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/chatgpt-ai-security-implications-supply-chain</guid>
      <pubDate>Sun, 15 Jan 2023 10:00:00 GMT</pubDate>
      <category>AI Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CCPA/CPRA and Software Security: What Developers Must Know]]></title>
      <description><![CDATA[California's privacy laws impose security obligations on software that handles consumer data. Here's how CCPA and CPRA intersect with supply chain risk.]]></description>
      <link>https://safeguard.sh/resources/blog/ccpa-cpra-software-security-requirements</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ccpa-cpra-software-security-requirements</guid>
      <pubDate>Sun, 15 Jan 2023 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Blue-Green Deployment Security]]></title>
      <description><![CDATA[Security considerations for blue-green deployment strategies including environment parity, rollback integrity, and data migration safety.]]></description>
      <link>https://safeguard.sh/resources/blog/blue-green-deployment-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/blue-green-deployment-security</guid>
      <pubDate>Sun, 15 Jan 2023 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Sensitive Data Exposure Prevention: Protecting Data at Rest, in Transit, and in Use]]></title>
      <description><![CDATA[Data exposure is not just about encryption. It is about knowing where your sensitive data lives, how it moves, and who can access it at every stage.]]></description>
      <link>https://safeguard.sh/resources/blog/sensitive-data-exposure-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sensitive-data-exposure-prevention</guid>
      <pubDate>Sun, 15 Jan 2023 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[CSP Bypass Techniques and Prevention: Beyond the Basics]]></title>
      <description><![CDATA[Content Security Policy is the strongest browser-side defense against XSS. But most CSP deployments are bypassable. Here is why, and how to fix it.]]></description>
      <link>https://safeguard.sh/resources/blog/csp-bypass-techniques-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/csp-bypass-techniques-prevention</guid>
      <pubDate>Thu, 12 Jan 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Nexus Repository Security Hardening: Beyond the Defaults]]></title>
      <description><![CDATA[Sonatype Nexus is everywhere. Its default configuration is permissive. Here is how to lock it down for enterprise use.]]></description>
      <link>https://safeguard.sh/resources/blog/nexus-repository-security-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nexus-repository-security-hardening</guid>
      <pubDate>Thu, 12 Jan 2023 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Container Image Hardening Checklist]]></title>
      <description><![CDATA[A comprehensive checklist for hardening your container images, from base image selection to runtime protections, with practical Dockerfile examples.]]></description>
      <link>https://safeguard.sh/resources/blog/container-image-hardening-checklist</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-image-hardening-checklist</guid>
      <pubDate>Thu, 12 Jan 2023 08:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[OpenSSL Project Governance: Security Lessons from Heartbleed and Beyond]]></title>
      <description><![CDATA[OpenSSL's transformation from a two-person project securing half the internet to a properly governed foundation offers a blueprint for open source security governance.]]></description>
      <link>https://safeguard.sh/resources/blog/openssl-project-governance-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openssl-project-governance-security</guid>
      <pubDate>Thu, 12 Jan 2023 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[CircleCI Credential Rotation: The Mass-Reset Event]]></title>
      <description><![CDATA[CircleCI told every customer to rotate every secret on January 4, 2023. Here is what actually happened and why the scope was total.]]></description>
      <link>https://safeguard.sh/resources/blog/circleci-credential-rotation-mass-event-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/circleci-credential-rotation-mass-event-2023</guid>
      <pubDate>Tue, 10 Jan 2023 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PHPStan Security Analysis: Static Typing as a Security Tool for PHP]]></title>
      <description><![CDATA[PHPStan brings static analysis to PHP. Its type checking catches entire classes of bugs that lead to security vulnerabilities in PHP applications.]]></description>
      <link>https://safeguard.sh/resources/blog/phpstan-security-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/phpstan-security-analysis</guid>
      <pubDate>Sun, 08 Jan 2023 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Symlink Attacks in Package Managers: Following Links to Trouble]]></title>
      <description><![CDATA[Symbolic links in package archives can redirect file operations to unintended locations. Here is how this old trick still works against modern tools.]]></description>
      <link>https://safeguard.sh/resources/blog/symlink-attacks-package-managers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/symlink-attacks-package-managers</guid>
      <pubDate>Sun, 08 Jan 2023 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Vendor Concentration Risk in Software: When One Vendor Failure Breaks Everything]]></title>
      <description><![CDATA[Depending on too few vendors creates systemic risk. The CrowdStrike outage proved it. Here is how to assess and manage vendor concentration in your software stack.]]></description>
      <link>https://safeguard.sh/resources/blog/vendor-concentration-risk-software</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vendor-concentration-risk-software</guid>
      <pubDate>Sun, 08 Jan 2023 10:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Vue.js Security Best Practices]]></title>
      <description><![CDATA[Securing Vue.js applications from template injection, XSS through v-html, and third-party plugin risks.]]></description>
      <link>https://safeguard.sh/resources/blog/vue-js-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vue-js-security-best-practices</guid>
      <pubDate>Sun, 08 Jan 2023 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[CircleCI Security Incident January 2023: What Happened and What We Learned]]></title>
      <description><![CDATA[CircleCI's January 2023 breach exposed secrets for thousands of organizations. Here's how the attack unfolded and what it means for CI/CD security.]]></description>
      <link>https://safeguard.sh/resources/blog/circleci-security-incident-january-2023</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/circleci-security-incident-january-2023</guid>
      <pubDate>Thu, 05 Jan 2023 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Race Condition Vulnerabilities in Web Applications]]></title>
      <description><![CDATA[Race conditions in web applications lead to double-spending, privilege escalation, and data corruption. This guide covers the most common patterns, detection techniques, and practical defenses.]]></description>
      <link>https://safeguard.sh/resources/blog/race-condition-vulnerabilities-web-apps</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/race-condition-vulnerabilities-web-apps</guid>
      <pubDate>Thu, 05 Jan 2023 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Slack GitHub Repository Theft: Stolen Tokens and the Risks of Third-Party Integrations]]></title>
      <description><![CDATA[In December 2022, Slack disclosed that stolen employee tokens were used to access private GitHub repositories. The breach highlighted the risks of token-based authentication in CI/CD pipelines.]]></description>
      <link>https://safeguard.sh/resources/blog/slack-github-repository-theft-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/slack-github-repository-theft-2022</guid>
      <pubDate>Wed, 04 Jan 2023 08:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Release Management Security Checklist]]></title>
      <description><![CDATA[A pre-release security checklist that covers dependency verification, vulnerability scanning, SBOM generation, and artifact integrity for every production release.]]></description>
      <link>https://safeguard.sh/resources/blog/release-management-security-checklist</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/release-management-security-checklist</guid>
      <pubDate>Wed, 28 Dec 2022 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Responsible Disclosure in Open Source: The Messy Reality]]></title>
      <description><![CDATA[Responsible disclosure sounds simple in theory. In practice, coordinating vulnerability disclosure across open source projects with no budgets, no SLAs, and no obligation to respond is an exercise in patience and diplomacy.]]></description>
      <link>https://safeguard.sh/resources/blog/responsible-disclosure-open-source</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/responsible-disclosure-open-source</guid>
      <pubDate>Thu, 22 Dec 2022 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security in 2022: The Year Everything Changed]]></title>
      <description><![CDATA[From LastPass to Log4j's aftermath to new regulations, 2022 was the year supply chain security went from niche concern to board-level priority.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-security-2022-year-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-security-2022-year-review</guid>
      <pubDate>Tue, 20 Dec 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[GLBA and Financial Software Security: Safeguards Rule Deep Dive]]></title>
      <description><![CDATA[The GLBA Safeguards Rule now requires specific cybersecurity controls for financial institutions. Here's how it affects software supply chains.]]></description>
      <link>https://safeguard.sh/resources/blog/glba-financial-software-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/glba-financial-software-security</guid>
      <pubDate>Tue, 20 Dec 2022 09:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Software Vendor Risk Scoring Methodology]]></title>
      <description><![CDATA[A practical framework for scoring and ranking software vendor risk based on supply chain security posture, vulnerability history, and development practices.]]></description>
      <link>https://safeguard.sh/resources/blog/software-vendor-risk-scoring-methodology</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-vendor-risk-scoring-methodology</guid>
      <pubDate>Sun, 18 Dec 2022 00:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Funding, Sustainability, and Security]]></title>
      <description><![CDATA[The software industry runs on open source maintained by unpaid volunteers. Until we fix the funding problem, we can't fix the security problem.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-funding-sustainability-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-funding-sustainability-security</guid>
      <pubDate>Thu, 15 Dec 2022 10:00:00 GMT</pubDate>
      <category>Open Source</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Security Budget Justification Guide]]></title>
      <description><![CDATA[How to build a compelling business case for security investment, with frameworks for quantifying risk, communicating with executives, and defending your security budget.]]></description>
      <link>https://safeguard.sh/resources/blog/security-budget-justification-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-budget-justification-guide</guid>
      <pubDate>Thu, 15 Dec 2022 00:00:00 GMT</pubDate>
      <category>Organizational Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Lessons from SolarWinds: Two Years Later]]></title>
      <description><![CDATA[Two years after the SolarWinds breach reshaped cybersecurity, we examine what the industry actually learned and what organizations still get wrong about supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/lessons-from-solarwinds-two-years-later</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lessons-from-solarwinds-two-years-later</guid>
      <pubDate>Tue, 13 Dec 2022 00:00:00 GMT</pubDate>
      <category>Case Studies</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Cilium Network Security in Kubernetes: Beyond Basic Network Policies]]></title>
      <description><![CDATA[Cilium uses eBPF to provide network security that standard Kubernetes NetworkPolicies cannot match. Here is what it adds and how to configure it.]]></description>
      <link>https://safeguard.sh/resources/blog/cilium-network-security-kubernetes</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cilium-network-security-kubernetes</guid>
      <pubDate>Mon, 12 Dec 2022 10:00:00 GMT</pubDate>
      <category>Kubernetes Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Repository Security Settings Guide]]></title>
      <description><![CDATA[Configure GitHub repository security settings for branch protection, secret scanning, dependency alerts, and code scanning.]]></description>
      <link>https://safeguard.sh/resources/blog/github-repository-security-settings-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-repository-security-settings-guide</guid>
      <pubDate>Mon, 12 Dec 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Log4j One Year Later: What We Learned and What We Didn't Fix]]></title>
      <description><![CDATA[A year after Log4Shell shook the internet, many organizations still had vulnerable instances. Here's what the anniversary revealed about our industry.]]></description>
      <link>https://safeguard.sh/resources/blog/log4j-one-year-later-lessons-learned</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/log4j-one-year-later-lessons-learned</guid>
      <pubDate>Mon, 12 Dec 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Single Points of Failure in Software Supply Chains]]></title>
      <description><![CDATA[Your software supply chain has single points of failure that would take down your entire operation. Most organizations have never mapped them.]]></description>
      <link>https://safeguard.sh/resources/blog/single-points-of-failure-supply-chains</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/single-points-of-failure-supply-chains</guid>
      <pubDate>Mon, 12 Dec 2022 10:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[FortiGate SSL-VPN Zero-Day (CVE-2022-42475): How a Heap Overflow Gave Attackers the Keys]]></title>
      <description><![CDATA[A heap-based buffer overflow in Fortinet's SSL-VPN was actively exploited before disclosure. State-sponsored actors used it to deploy custom implants on critical infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/fortinet-fortigate-ssl-vpn-cve-2022-42475</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fortinet-fortigate-ssl-vpn-cve-2022-42475</guid>
      <pubDate>Mon, 12 Dec 2022 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The End-of-Year Dependency Audit Ritual]]></title>
      <description><![CDATA[Most dependency audits get done in a panic after a CVE lands. A planned year-end audit is cheaper, more thorough, and produces a backlog you can actually work through in Q1.]]></description>
      <link>https://safeguard.sh/resources/blog/end-of-year-dependency-audit-ritual-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/end-of-year-dependency-audit-ritual-2022</guid>
      <pubDate>Sat, 10 Dec 2022 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Startup Security at Series A: Scaling Without Breaking]]></title>
      <description><![CDATA[You have raised Series A, hired 20 engineers, and landed your first enterprise customers. Your seed-stage security shortcuts are starting to crack. Here is how to scale security alongside your product.]]></description>
      <link>https://safeguard.sh/resources/blog/startup-security-series-a-scaling</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/startup-security-series-a-scaling</guid>
      <pubDate>Sat, 10 Dec 2022 00:00:00 GMT</pubDate>
      <category>Startup Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cargo Build Script Security: What build.rs Can Do to Your Machine]]></title>
      <description><![CDATA[Rust build scripts run arbitrary code during compilation. Here is what they can access and how to evaluate the risk in your dependency tree.]]></description>
      <link>https://safeguard.sh/resources/blog/cargo-build-script-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cargo-build-script-security</guid>
      <pubDate>Thu, 08 Dec 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[FOSSA Review: Open Source License Compliance at Enterprise Scale]]></title>
      <description><![CDATA[A review of FOSSA for open source license compliance and vulnerability management, covering license detection, policy automation, and enterprise integration patterns.]]></description>
      <link>https://safeguard.sh/resources/blog/fossa-open-source-compliance-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fossa-open-source-compliance-review</guid>
      <pubDate>Thu, 08 Dec 2022 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Pod Security Standards: From PodSecurityPolicy to the New Admission Controller]]></title>
      <description><![CDATA[PodSecurityPolicy is dead. Pod Security Standards replaced it. Here is what changed, what the three levels mean, and how to migrate without breaking your clusters.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-pod-security-standards</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-pod-security-standards</guid>
      <pubDate>Thu, 08 Dec 2022 00:00:00 GMT</pubDate>
      <category>Kubernetes Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Code Signing Bypass: When the Trust Anchor Fails]]></title>
      <description><![CDATA[A vulnerability in GitHub's commit signature verification allowed attackers to forge signed commits. The flaw undermined the integrity guarantees that code signing is supposed to provide.]]></description>
      <link>https://safeguard.sh/resources/blog/github-code-signing-bypass-vulnerability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-code-signing-bypass-vulnerability</guid>
      <pubDate>Mon, 05 Dec 2022 11:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[LDAP Injection Prevention Guide]]></title>
      <description><![CDATA[LDAP injection attacks manipulate directory service queries to bypass authentication, extract sensitive data, and enumerate user accounts. This guide covers attack techniques and practical defenses for applications using LDAP.]]></description>
      <link>https://safeguard.sh/resources/blog/ldap-injection-prevention-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ldap-injection-prevention-guide</guid>
      <pubDate>Mon, 05 Dec 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Property-Based Testing for Security: Defining Invariants That Must Never Break]]></title>
      <description><![CDATA[Property-based testing defines invariants about program behavior and generates thousands of test cases automatically. For security code, the right properties can catch vulnerabilities that example-based tests miss.]]></description>
      <link>https://safeguard.sh/resources/blog/property-based-testing-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/property-based-testing-security</guid>
      <pubDate>Mon, 05 Dec 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Malware Campaigns Surge in Q4 2022: A Roundup of the Worst Offenders]]></title>
      <description><![CDATA[Python's package registry saw an explosion of malicious packages in late 2022, from credential stealers to reverse shells. Here's what we found.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-malware-campaigns-q4-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-malware-campaigns-q4-2022</guid>
      <pubDate>Mon, 05 Dec 2022 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Graph Analysis: Finding Hidden Transitive Risks]]></title>
      <description><![CDATA[Your project has 50 direct dependencies. It actually depends on 1,200 packages. Transitive dependency analysis is how you find the risks hiding three layers deep.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-graph-analysis-transitive-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-graph-analysis-transitive-risks</guid>
      <pubDate>Thu, 01 Dec 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Incident Response Playbook for Supply Chain Attacks]]></title>
      <description><![CDATA[Supply chain attacks break your standard IR playbook. The compromise originates outside your perimeter, affects trusted software, and the blast radius is unknown. Here's how to adapt.]]></description>
      <link>https://safeguard.sh/resources/blog/incident-response-playbook-supply-chain-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/incident-response-playbook-supply-chain-attacks</guid>
      <pubDate>Mon, 28 Nov 2022 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[5G Networks and the Software Supply Chain Risks Nobody Talks About]]></title>
      <description><![CDATA[5G networks are software-defined infrastructure built on open-source components. The supply chain implications are enormous and under-discussed.]]></description>
      <link>https://safeguard.sh/resources/blog/5g-network-software-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/5g-network-software-supply-chain-risks</guid>
      <pubDate>Fri, 25 Nov 2022 10:00:00 GMT</pubDate>
      <category>Emerging Technology</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[LastPass Second Breach: Encrypted Vaults Stolen Using Data from First Attack]]></title>
      <description><![CDATA[LastPass revealed that the August breach enabled a second attack that exfiltrated encrypted customer vaults. The full scope of the damage was devastating.]]></description>
      <link>https://safeguard.sh/resources/blog/lastpass-second-breach-encrypted-vaults</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lastpass-second-breach-encrypted-vaults</guid>
      <pubDate>Tue, 22 Nov 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Penetration Testing the Software Supply Chain]]></title>
      <description><![CDATA[Traditional pentests focus on the application. Supply chain pentesting targets the build pipeline, dependency resolution, and distribution mechanisms. Here is how to approach it.]]></description>
      <link>https://safeguard.sh/resources/blog/penetration-testing-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/penetration-testing-software-supply-chain</guid>
      <pubDate>Tue, 22 Nov 2022 10:00:00 GMT</pubDate>
      <category>Offensive Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Startup Security Budget Allocation: Where to Spend First]]></title>
      <description><![CDATA[Startups can't afford to do everything at once. Here's how to allocate your security budget for maximum impact, including software supply chain basics.]]></description>
      <link>https://safeguard.sh/resources/blog/startup-security-budget-allocation-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/startup-security-budget-allocation-guide</guid>
      <pubDate>Tue, 22 Nov 2022 09:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Correlation Across Package Ecosystems]]></title>
      <description><![CDATA[The same vulnerability often appears under different identifiers across npm, PyPI, Maven, and other ecosystems. Here is how to correlate vulnerabilities across ecosystems and why it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-correlation-across-ecosystems</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-correlation-across-ecosystems</guid>
      <pubDate>Tue, 22 Nov 2022 09:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[The Open Source Maintainer Burnout Crisis and Its Security Consequences]]></title>
      <description><![CDATA[Burned-out maintainers abandon projects, accept risky PRs without review, and hand off keys to strangers. The burnout crisis is a supply chain security crisis.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-maintainer-burnout-crisis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-maintainer-burnout-crisis</guid>
      <pubDate>Sun, 20 Nov 2022 00:00:00 GMT</pubDate>
      <category>Open Source</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Docker Desktop WSL2 Security Changes in 2022]]></title>
      <description><![CDATA[Docker Desktop's WSL2 backend reshaped container security on Windows. Here is what changed in 2022 and the defects that forced those changes.]]></description>
      <link>https://safeguard.sh/resources/blog/docker-desktop-wsl2-security-changes-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/docker-desktop-wsl2-security-changes-2022</guid>
      <pubDate>Fri, 18 Nov 2022 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AWS ECR Container Scanning: Beyond the Defaults]]></title>
      <description><![CDATA[A deep dive into ECR scanning options, from basic Clair scanning to enhanced Inspector integration, and what most teams get wrong.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-ecr-container-scanning-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-ecr-container-scanning-guide</guid>
      <pubDate>Fri, 18 Nov 2022 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Python Package Security Best Practices]]></title>
      <description><![CDATA[Practical techniques for securing your Python supply chain, from pip and PyPI to virtual environments and hash verification.]]></description>
      <link>https://safeguard.sh/resources/blog/python-package-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-package-security-best-practices</guid>
      <pubDate>Fri, 18 Nov 2022 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Scaling a Security Champions Network]]></title>
      <description><![CDATA[Security teams can't be everywhere. A well-structured security champions network extends security expertise into every development team without bottlenecking delivery.]]></description>
      <link>https://safeguard.sh/resources/blog/security-champions-network-scaling</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-champions-network-scaling</guid>
      <pubDate>Fri, 18 Nov 2022 00:00:00 GMT</pubDate>
      <category>Security Culture</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Browser Extension Supply Chain Attacks: The Overlooked Threat Vector]]></title>
      <description><![CDATA[Browser extensions have become a prime target for supply chain attackers. With access to browsing data, credentials, and session tokens, a compromised extension is a skeleton key to your organization.]]></description>
      <link>https://safeguard.sh/resources/blog/browser-extension-supply-chain-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/browser-extension-supply-chain-attacks</guid>
      <pubDate>Tue, 15 Nov 2022 10:00:00 GMT</pubDate>
      <category>Threat Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Podman vs Docker Security: What Actually Changes When You Drop the Daemon]]></title>
      <description><![CDATA[Podman is daemonless, rootless by default, and fork-exec instead of client-server. Here is what those architectural differences mean for container security in practice.]]></description>
      <link>https://safeguard.sh/resources/blog/podman-vs-docker-security-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/podman-vs-docker-security-comparison</guid>
      <pubDate>Tue, 15 Nov 2022 00:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Runtime vs Static Container Analysis: Complementary, Not Competing]]></title>
      <description><![CDATA[Static scanning finds known vulnerabilities. Runtime analysis finds actual exploitation. Using only one gives you half the picture.]]></description>
      <link>https://safeguard.sh/resources/blog/runtime-vs-static-container-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/runtime-vs-static-container-analysis</guid>
      <pubDate>Sat, 12 Nov 2022 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Rust Adoption in Security-Critical Software: Where We Stand]]></title>
      <description><![CDATA[Rust promises memory safety without garbage collection. Here is an honest look at where adoption stands and what it means for supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-adoption-security-critical-software</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-adoption-security-critical-software</guid>
      <pubDate>Sat, 12 Nov 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Forensics: Investigation Techniques After a Compromise]]></title>
      <description><![CDATA[When a supply chain compromise is confirmed or suspected, forensic investigation must trace the attack path through dependencies, build systems, and artifacts. This guide covers the methodology.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-forensics-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-forensics-guide</guid>
      <pubDate>Sat, 12 Nov 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[WAF Rule Writing Best Practices: From Alert Fatigue to Actionable Protection]]></title>
      <description><![CDATA[Most WAF deployments drown in false positives because the rules were never tuned. Here is how to write rules that protect without blocking legitimate traffic.]]></description>
      <link>https://safeguard.sh/resources/blog/waf-rule-writing-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/waf-rule-writing-best-practices</guid>
      <pubDate>Sat, 12 Nov 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Taming Static Analysis: A Practical Guide to False Positive Reduction]]></title>
      <description><![CDATA[False positives kill SAST adoption faster than anything else. Here is how to cut through the noise without missing real vulnerabilities.]]></description>
      <link>https://safeguard.sh/resources/blog/static-analysis-false-positive-reduction</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/static-analysis-false-positive-reduction</guid>
      <pubDate>Sat, 12 Nov 2022 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Coordination Across the Open Source Ecosystem]]></title>
      <description><![CDATA[When a vulnerability affects a library used by thousands of projects, coordinating the fix is harder than writing the patch. The coordination problem is open source security's biggest operational challenge.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-coordination-open-source</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-coordination-open-source</guid>
      <pubDate>Sat, 12 Nov 2022 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Automating Vulnerability Remediation: A Practical Guide]]></title>
      <description><![CDATA[Stop drowning in CVE backlogs. Learn how to build automated remediation workflows that fix vulnerabilities faster without burning out your engineering team.]]></description>
      <link>https://safeguard.sh/resources/blog/automating-vulnerability-remediation-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/automating-vulnerability-remediation-guide</guid>
      <pubDate>Tue, 08 Nov 2022 14:00:00 GMT</pubDate>
      <category>How-To Guide</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Container Image Signing with Cosign: A Practical Deep Dive]]></title>
      <description><![CDATA[Cosign makes signing and verifying container images straightforward. Here's everything you need to know to implement it in your pipeline.]]></description>
      <link>https://safeguard.sh/resources/blog/container-image-signing-with-cosign</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-image-signing-with-cosign</guid>
      <pubDate>Tue, 08 Nov 2022 10:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Software Update Signing and Verification: Getting It Right]]></title>
      <description><![CDATA[Signed updates are table stakes for software distribution. But the signing and verification process has pitfalls that undermine the entire security model.]]></description>
      <link>https://safeguard.sh/resources/blog/software-update-signing-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-update-signing-verification</guid>
      <pubDate>Tue, 08 Nov 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Jenkins Pipeline Security Hardening]]></title>
      <description><![CDATA[How to lock down Jenkins pipelines against credential theft, script injection, and unauthorized access with practical hardening steps.]]></description>
      <link>https://safeguard.sh/resources/blog/jenkins-pipeline-security-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jenkins-pipeline-security-hardening</guid>
      <pubDate>Tue, 08 Nov 2022 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Brand Protection on Package Registries: Defending Your Namespace]]></title>
      <description><![CDATA[Attackers impersonate legitimate organizations on package registries through name squatting, logo theft, and metadata manipulation. Here is how to protect your brand and your users.]]></description>
      <link>https://safeguard.sh/resources/blog/brand-protection-package-registries</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/brand-protection-package-registries</guid>
      <pubDate>Sat, 05 Nov 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Namespace Squatting: How Attackers Exploit Python's Flat Package Namespace]]></title>
      <description><![CDATA[Python's package registry has no namespace protection. Attackers exploit this with typosquatting, namespace confusion, and abandoned name reclamation. Here is how to protect your Python supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-namespace-squatting-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-namespace-squatting-prevention</guid>
      <pubDate>Sat, 05 Nov 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Browser Extension Permission Models and Supply Chain Risk]]></title>
      <description><![CDATA[Browser extensions operate with broad permissions and auto-update silently. Here is how the extension permission model creates supply chain risks and what organizations can do about it.]]></description>
      <link>https://safeguard.sh/resources/blog/browser-extension-permission-model</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/browser-extension-permission-model</guid>
      <pubDate>Sat, 05 Nov 2022 09:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Browser Extension Attacks and the Supply Chain]]></title>
      <description><![CDATA[Browser extensions run with elevated privileges and update automatically. When attackers compromise or acquire popular extensions, they gain access to millions of users instantly.]]></description>
      <link>https://safeguard.sh/resources/blog/browser-supply-chain-extension-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/browser-supply-chain-extension-attacks</guid>
      <pubDate>Sat, 05 Nov 2022 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Dropbox Breach: Phishing Attack Exposes 130 Private GitHub Repositories]]></title>
      <description><![CDATA[Attackers phished Dropbox employees by impersonating CircleCI, gaining access to 130 private GitHub repos containing internal code and credentials.]]></description>
      <link>https://safeguard.sh/resources/blog/dropbox-phishing-attack-github-repositories</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dropbox-phishing-attack-github-repositories</guid>
      <pubDate>Wed, 02 Nov 2022 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Makefile Injection Attacks: When Build Automation Becomes a Weapon]]></title>
      <description><![CDATA[Makefiles execute shell commands by design. When those commands incorporate untrusted input, the results are predictably dangerous.]]></description>
      <link>https://safeguard.sh/resources/blog/makefile-injection-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/makefile-injection-attacks</guid>
      <pubDate>Sun, 30 Oct 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[OpenSSL CVE-2022-3602: The Critical That Wasn't (But Still Matters)]]></title>
      <description><![CDATA[OpenSSL pre-announced a critical vulnerability that was later downgraded to high severity. The incident revealed as much about our processes as the bug itself.]]></description>
      <link>https://safeguard.sh/resources/blog/openssl-critical-vulnerability-cve-2022-3602</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openssl-critical-vulnerability-cve-2022-3602</guid>
      <pubDate>Fri, 28 Oct 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Real Estate and PropTech Security Considerations]]></title>
      <description><![CDATA[PropTech platforms handle wire transfers, personal data, and property records. Software supply chain security is essential as real estate goes digital.]]></description>
      <link>https://safeguard.sh/resources/blog/real-estate-proptech-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/real-estate-proptech-security-considerations</guid>
      <pubDate>Fri, 28 Oct 2022 09:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Build Reproducibility: A Verification Guide]]></title>
      <description><![CDATA[If you cannot reproduce a build bit-for-bit, you cannot verify it was not tampered with. This guide covers deterministic builds, reproducibility verification, and why it matters for supply chain trust.]]></description>
      <link>https://safeguard.sh/resources/blog/build-reproducibility-verification-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/build-reproducibility-verification-guide</guid>
      <pubDate>Tue, 25 Oct 2022 11:00:00 GMT</pubDate>
      <category>Build Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Security Impact Analysis for Dependency Updates]]></title>
      <description><![CDATA[Updating a dependency is not just a version bump. Here is how to assess the security impact of dependency changes before they reach production.]]></description>
      <link>https://safeguard.sh/resources/blog/security-impact-analysis-dependency-updates</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-impact-analysis-dependency-updates</guid>
      <pubDate>Tue, 25 Oct 2022 09:00:00 GMT</pubDate>
      <category>Dependency Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Mend.io (WhiteSource): The Renamed SCA Veteran]]></title>
      <description><![CDATA[A review of Mend.io, formerly WhiteSource, covering its SCA capabilities, Renovate integration, automated remediation, and position in the crowded dependency scanning market.]]></description>
      <link>https://safeguard.sh/resources/blog/mend-io-whitesource-sca-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mend-io-whitesource-sca-review</guid>
      <pubDate>Sat, 22 Oct 2022 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SQL Injection Prevention in 2022: Why It Still Happens and How to Stop It]]></title>
      <description><![CDATA[SQL injection has been the top web vulnerability for over two decades. Modern frameworks help, but they do not make it impossible. Here is what still goes wrong.]]></description>
      <link>https://safeguard.sh/resources/blog/sql-injection-prevention-modern-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sql-injection-prevention-modern-guide</guid>
      <pubDate>Sat, 22 Oct 2022 00:00:00 GMT</pubDate>
      <category>Code Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Tekton Pipeline Security Guide]]></title>
      <description><![CDATA[Securing Tekton CI/CD pipelines on Kubernetes with task isolation, supply chain verification, and least-privilege service accounts.]]></description>
      <link>https://safeguard.sh/resources/blog/tekton-pipeline-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/tekton-pipeline-security-guide</guid>
      <pubDate>Sat, 22 Oct 2022 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Policy Template for Enterprises]]></title>
      <description><![CDATA[A practical template for crafting an enterprise open-source usage policy that balances developer freedom with security and compliance requirements.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-policy-template-enterprises</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-policy-template-enterprises</guid>
      <pubDate>Thu, 20 Oct 2022 14:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[The SBOM Maturity Model: A Practical Roadmap for Enterprise Adoption]]></title>
      <description><![CDATA[Most organizations are still at SBOM Level 0. Here's a five-level maturity model to guide your journey from no SBOMs to full supply chain transparency.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-maturity-model-for-enterprises</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-maturity-model-for-enterprises</guid>
      <pubDate>Thu, 20 Oct 2022 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Package Lock Files and Their Security Implications]]></title>
      <description><![CDATA[Lock files are your first line of defense against dependency drift. This guide explains how package-lock.json, yarn.lock, and similar files protect your builds from supply chain manipulation.]]></description>
      <link>https://safeguard.sh/resources/blog/package-lock-files-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/package-lock-files-security-implications</guid>
      <pubDate>Tue, 18 Oct 2022 11:00:00 GMT</pubDate>
      <category>Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Text4Shell (CVE-2022-42889): Apache Commons Text and the Haunting Echo of Log4Shell]]></title>
      <description><![CDATA[A critical RCE vulnerability in Apache Commons Text drew immediate comparisons to Log4Shell. While less severe in practice, it highlighted how deeply embedded utility libraries create systemic risk.]]></description>
      <link>https://safeguard.sh/resources/blog/apache-commons-text-text4shell-cve-2022-42889</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apache-commons-text-text4shell-cve-2022-42889</guid>
      <pubDate>Tue, 18 Oct 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[LockBit 3.0: The Evolution of the World's Most Prolific Ransomware Operation]]></title>
      <description><![CDATA[LockBit 3.0 introduced bug bounties, new extortion tactics, and industrial-scale operations that made it the dominant ransomware group through 2022 and 2023.]]></description>
      <link>https://safeguard.sh/resources/blog/lockbit-3-0-ransomware-evolution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lockbit-3-0-ransomware-evolution</guid>
      <pubDate>Tue, 18 Oct 2022 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Business Continuity Planning for Supply Chain Attacks]]></title>
      <description><![CDATA[When a critical dependency is compromised or disappears, can your business keep running? Most organizations haven't answered this question honestly.]]></description>
      <link>https://safeguard.sh/resources/blog/business-continuity-supply-chain-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/business-continuity-supply-chain-attacks</guid>
      <pubDate>Tue, 18 Oct 2022 00:00:00 GMT</pubDate>
      <category>Business Continuity</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[VS Code Extension Marketplace Security: The IDE Supply Chain]]></title>
      <description><![CDATA[VS Code extensions run with the same privileges as your editor — which means full access to your source code, terminal, and credentials. The marketplace security model does not prevent malicious extensions.]]></description>
      <link>https://safeguard.sh/resources/blog/vscode-extension-marketplace-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vscode-extension-marketplace-security</guid>
      <pubDate>Tue, 18 Oct 2022 00:00:00 GMT</pubDate>
      <category>Developer Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Azure DevOps Pipeline Security Hardening: A Practical Guide]]></title>
      <description><![CDATA[How to lock down your Azure DevOps pipelines against supply chain attacks, credential leaks, and unauthorized deployments.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-devops-pipeline-security-hardening</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-devops-pipeline-security-hardening</guid>
      <pubDate>Sat, 15 Oct 2022 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Bandit for Python Security Linting: Getting Real Value From Static Analysis]]></title>
      <description><![CDATA[Bandit scans Python code for security issues. Here is how to configure it so it catches real bugs without burying your team in false positives.]]></description>
      <link>https://safeguard.sh/resources/blog/bandit-python-security-linting</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bandit-python-security-linting</guid>
      <pubDate>Sat, 15 Oct 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Sigstore Reaches GA: Free Software Signing for Everyone]]></title>
      <description><![CDATA[Sigstore's general availability in October 2022 made cryptographic signing accessible to every developer. Here's why this is a watershed moment.]]></description>
      <link>https://safeguard.sh/resources/blog/sigstore-general-availability-software-signing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sigstore-general-availability-software-signing</guid>
      <pubDate>Sat, 15 Oct 2022 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Setting Up Pre-Commit Security Hooks]]></title>
      <description><![CDATA[Catch secrets, vulnerable patterns, and misconfigurations before they reach your repository with pre-commit hooks that developers will actually keep enabled.]]></description>
      <link>https://safeguard.sh/resources/blog/pre-commit-security-hooks-setup-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pre-commit-security-hooks-setup-guide</guid>
      <pubDate>Wed, 12 Oct 2022 13:00:00 GMT</pubDate>
      <category>How-To Guide</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Debian Repository Security: A Practical Hardening Guide]]></title>
      <description><![CDATA[Debian APT is powerful but riddled with trust assumptions. Here is how to lock it down for production environments.]]></description>
      <link>https://safeguard.sh/resources/blog/debian-repository-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/debian-repository-security-guide</guid>
      <pubDate>Wed, 12 Oct 2022 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[iOS Sideloading Security Implications for Enterprise Environments]]></title>
      <description><![CDATA[Regulatory pressure is forcing Apple to allow sideloading. For enterprise security teams, this changes the iOS threat model fundamentally.]]></description>
      <link>https://safeguard.sh/resources/blog/ios-sideloading-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ios-sideloading-security-implications</guid>
      <pubDate>Wed, 12 Oct 2022 10:00:00 GMT</pubDate>
      <category>Mobile Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[OPA Gatekeeper for Kubernetes: Writing Policies That Actually Work]]></title>
      <description><![CDATA[Gatekeeper brings OPA's policy engine to Kubernetes. The learning curve is steep but the flexibility is unmatched. Here is how to write, test, and deploy Rego policies that enforce real security.]]></description>
      <link>https://safeguard.sh/resources/blog/opa-gatekeeper-kubernetes-policies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/opa-gatekeeper-kubernetes-policies</guid>
      <pubDate>Wed, 12 Oct 2022 00:00:00 GMT</pubDate>
      <category>Kubernetes Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Tern: Container SBOM Generation Through Layer Analysis]]></title>
      <description><![CDATA[A review of Tern, the open source tool that generates SBOMs by inspecting container image layers, including its strengths, limitations, and where it fits in your toolchain.]]></description>
      <link>https://safeguard.sh/resources/blog/tern-sbom-container-analysis-tool</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/tern-sbom-container-analysis-tool</guid>
      <pubDate>Wed, 12 Oct 2022 00:00:00 GMT</pubDate>
      <category>Tool Reviews</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[CISA Self-Attestation Form: What Software Producers Need to Know]]></title>
      <description><![CDATA[OMB M-22-18 requires software producers selling to the federal government to self-attest to secure development practices. Here's what's required.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-self-attestation-form-secure-software</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-self-attestation-form-secure-software</guid>
      <pubDate>Sat, 08 Oct 2022 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GDPR and Software Supply Chain Obligations You Can't Ignore]]></title>
      <description><![CDATA[GDPR's security requirements extend deep into software supply chains. Here's where data protection law meets dependency management.]]></description>
      <link>https://safeguard.sh/resources/blog/gdpr-software-supply-chain-obligations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gdpr-software-supply-chain-obligations</guid>
      <pubDate>Sat, 08 Oct 2022 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Security ROI Calculation Methods That Actually Work]]></title>
      <description><![CDATA[Calculating security ROI is notoriously difficult because you are measuring things that did not happen. Here are methods that produce credible numbers.]]></description>
      <link>https://safeguard.sh/resources/blog/security-roi-calculation-methods</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-roi-calculation-methods</guid>
      <pubDate>Sat, 08 Oct 2022 10:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Package Manager Security: npm, pip, and Maven Compared]]></title>
      <description><![CDATA[Each package manager has its own security model, attack surface, and best practices. This guide compares npm, pip, and Maven from a supply chain security perspective.]]></description>
      <link>https://safeguard.sh/resources/blog/package-manager-security-npm-pip-maven</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/package-manager-security-npm-pip-maven</guid>
      <pubDate>Sat, 08 Oct 2022 09:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Generating SBOMs from Container Images: A Practical Guide]]></title>
      <description><![CDATA[Container images are opaque by default. Here's how to crack them open with SBOMs to see exactly what's running in production.]]></description>
      <link>https://safeguard.sh/resources/blog/generating-sbom-from-container-images</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/generating-sbom-from-container-images</guid>
      <pubDate>Sat, 08 Oct 2022 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Cookie Security for Modern Web Applications]]></title>
      <description><![CDATA[Cookie misconfigurations remain one of the most common web vulnerabilities. From SameSite to cookie prefixes, here is how to configure cookies that resist session hijacking and CSRF attacks.]]></description>
      <link>https://safeguard.sh/resources/blog/cookie-security-modern-web-apps</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cookie-security-modern-web-apps</guid>
      <pubDate>Wed, 05 Oct 2022 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Network Segmentation for Development Environments: Isolating the Build Pipeline]]></title>
      <description><![CDATA[Development environments are often the weakest link in network security. Proper segmentation isolates build systems from production and prevents lateral movement from compromised developer machines.]]></description>
      <link>https://safeguard.sh/resources/blog/network-segmentation-development-environments</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/network-segmentation-development-environments</guid>
      <pubDate>Wed, 05 Oct 2022 10:00:00 GMT</pubDate>
      <category>Network Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[PHP Composer Dependency Security]]></title>
      <description><![CDATA[Securing PHP applications through Composer lockfiles, Packagist verification, and automated vulnerability scanning.]]></description>
      <link>https://safeguard.sh/resources/blog/php-composer-dependency-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/php-composer-dependency-security</guid>
      <pubDate>Wed, 05 Oct 2022 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Telecommunications Supply Chain Security: Protecting Critical Infrastructure]]></title>
      <description><![CDATA[Telecom networks are critical infrastructure that depend on complex software supply chains. Here's how carriers and equipment providers should approach security.]]></description>
      <link>https://safeguard.sh/resources/blog/telecommunications-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/telecommunications-supply-chain-security</guid>
      <pubDate>Wed, 05 Oct 2022 10:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Developer Productivity vs. Security: Finding the Real Balance]]></title>
      <description><![CDATA[The security-productivity tension is real but often exaggerated. Most friction comes from bad tooling and poor processes, not from security itself. Here is how to fix the actual problems.]]></description>
      <link>https://safeguard.sh/resources/blog/developer-productivity-security-balance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/developer-productivity-security-balance</guid>
      <pubDate>Wed, 05 Oct 2022 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Trusted Computing and TPM in the Software Supply Chain]]></title>
      <description><![CDATA[Trusted Platform Modules provide a hardware root of trust for verifying software integrity. Understanding how TPMs fit into supply chain security helps build tamper-resistant systems.]]></description>
      <link>https://safeguard.sh/resources/blog/trusted-computing-tpm-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/trusted-computing-tpm-software-supply-chain</guid>
      <pubDate>Wed, 05 Oct 2022 00:00:00 GMT</pubDate>
      <category>Hardware Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[npm Registry Security Gets Serious: 2022's Major Improvements]]></title>
      <description><![CDATA[From mandatory MFA for top packages to enhanced login verification, npm made significant security improvements in 2022. Here's what changed.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-registry-security-improvements-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-registry-security-improvements-2022</guid>
      <pubDate>Sat, 01 Oct 2022 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[ProxyNotShell CVE-2022-41040: Microsoft Exchange Under Fire Again]]></title>
      <description><![CDATA[ProxyNotShell chained two Exchange vulnerabilities for authenticated RCE, exploited in the wild for weeks before Microsoft delivered a patch. Exchange admins were running out of patience.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-exchange-proxynotshell-cve-2022-41040</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-exchange-proxynotshell-cve-2022-41040</guid>
      <pubDate>Fri, 30 Sep 2022 10:00:00 GMT</pubDate>
      <category>Zero-Day Exploits</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[OSS Review Toolkit (ORT): Automating License Compliance at Scale]]></title>
      <description><![CDATA[The OSS Review Toolkit handles license scanning, vulnerability detection, and compliance policy enforcement. Here's how to put it to work.]]></description>
      <link>https://safeguard.sh/resources/blog/oss-review-toolkit-ort-license-compliance</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/oss-review-toolkit-ort-license-compliance</guid>
      <pubDate>Wed, 28 Sep 2022 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Migrating Dependencies for Security: A Step-by-Step Guide]]></title>
      <description><![CDATA[When a dependency becomes a security liability, migration is the only real fix. Here is a structured approach to dependency migration that minimizes risk and disruption.]]></description>
      <link>https://safeguard.sh/resources/blog/migrating-dependencies-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/migrating-dependencies-security-guide</guid>
      <pubDate>Wed, 28 Sep 2022 09:00:00 GMT</pubDate>
      <category>Dependency Management</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Database Extensions as Supply Chain Risk: The Overlooked Attack Surface]]></title>
      <description><![CDATA[PostgreSQL extensions, MySQL plugins, and database add-ons run with database-level privileges. A compromised extension has direct access to your data. Most organizations never audit them.]]></description>
      <link>https://safeguard.sh/resources/blog/database-extension-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/database-extension-supply-chain-risks</guid>
      <pubDate>Wed, 28 Sep 2022 00:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Compression Library Vulnerabilities: From zlib to the xz Backdoor]]></title>
      <description><![CDATA[Compression libraries are everywhere and trusted implicitly. The xz backdoor proved that trust can be weaponized. Here is the full picture.]]></description>
      <link>https://safeguard.sh/resources/blog/compression-library-vulnerabilities-zlib-xz</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/compression-library-vulnerabilities-zlib-xz</guid>
      <pubDate>Thu, 22 Sep 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[The Open Source Software Security Act of 2022: What It Means for Developers]]></title>
      <description><![CDATA[The U.S. Senate introduced legislation directing CISA to secure open source software used by the federal government. Here's what the bill contains.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-software-security-act-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-software-security-act-2022</guid>
      <pubDate>Thu, 22 Sep 2022 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Building an SBOM Program from Scratch: A Practical Guide]]></title>
      <description><![CDATA[Standing up an SBOM program is more than picking a tool. This guide covers organizational buy-in, tooling selection, automation, and scaling from your first BOM to enterprise-wide adoption.]]></description>
      <link>https://safeguard.sh/resources/blog/building-sbom-program-from-scratch</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/building-sbom-program-from-scratch</guid>
      <pubDate>Tue, 20 Sep 2022 11:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Admission Controllers for Supply Chain Policy]]></title>
      <description><![CDATA[Admission controllers are the only Kubernetes enforcement point that sees every workload before it runs. That makes them the right place to enforce image provenance, signing, and SBOM policies.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-admission-controllers-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-admission-controllers-supply-chain</guid>
      <pubDate>Sun, 18 Sep 2022 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GoSec Static Analysis for Go: Practical Security Scanning]]></title>
      <description><![CDATA[GoSec finds security issues in Go source code. Here is how to get the most out of it without fighting false positives all day.]]></description>
      <link>https://safeguard.sh/resources/blog/gosec-static-analysis-for-go</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gosec-static-analysis-for-go</guid>
      <pubDate>Sun, 18 Sep 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[SOX Compliance in Software Development: The Supply Chain Angle]]></title>
      <description><![CDATA[Sarbanes-Oxley requirements for internal controls extend into software development and supply chain integrity. Here's the connection most teams miss.]]></description>
      <link>https://safeguard.sh/resources/blog/sox-compliance-software-development</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sox-compliance-software-development</guid>
      <pubDate>Sun, 18 Sep 2022 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Uber's 2022 Breach: How an 18-Year-Old Social Engineered Past MFA]]></title>
      <description><![CDATA[An attacker bombarded an Uber contractor with MFA push notifications until they accepted. What followed was a full compromise of internal systems.]]></description>
      <link>https://safeguard.sh/resources/blog/uber-breach-2022-social-engineering-attack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/uber-breach-2022-social-engineering-attack</guid>
      <pubDate>Fri, 16 Sep 2022 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Software Transparency and the EU Cyber Resilience Act]]></title>
      <description><![CDATA[The EU Cyber Resilience Act is rewriting the rules for software sold in Europe. Mandatory vulnerability handling, SBOM requirements, and security-by-design obligations are coming for every vendor.]]></description>
      <link>https://safeguard.sh/resources/blog/software-transparency-eu-cyber-resilience-act</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-transparency-eu-cyber-resilience-act</guid>
      <pubDate>Thu, 15 Sep 2022 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Retail and E-Commerce Software Supply Chain Security]]></title>
      <description><![CDATA[E-commerce platforms process millions in transactions daily using open-source components. Here's how retail organizations should manage software supply chain risk.]]></description>
      <link>https://safeguard.sh/resources/blog/retail-ecommerce-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/retail-ecommerce-software-supply-chain</guid>
      <pubDate>Thu, 15 Sep 2022 09:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SPDX Specification: A Practical Guide for Security Teams]]></title>
      <description><![CDATA[SPDX is the ISO-standardized SBOM format. Here's how to use it effectively for security, not just license compliance.]]></description>
      <link>https://safeguard.sh/resources/blog/spdx-specification-practical-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spdx-specification-practical-guide</guid>
      <pubDate>Thu, 15 Sep 2022 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Trivy vs Grype: Open Source Vulnerability Scanners Compared]]></title>
      <description><![CDATA[A practical comparison of Trivy and Grype for vulnerability scanning, covering detection accuracy, performance, SBOM support, and real-world usage patterns.]]></description>
      <link>https://safeguard.sh/resources/blog/trivy-grype-vulnerability-scanner-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/trivy-grype-vulnerability-scanner-comparison</guid>
      <pubDate>Thu, 15 Sep 2022 00:00:00 GMT</pubDate>
      <category>Tool Comparisons</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Angular Application Security Checklist]]></title>
      <description><![CDATA[A practical security checklist for Angular applications covering XSS prevention, dependency management, and secure configuration.]]></description>
      <link>https://safeguard.sh/resources/blog/angular-application-security-checklist</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/angular-application-security-checklist</guid>
      <pubDate>Mon, 12 Sep 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[CORS Misconfiguration Exploitation: The Silent API Exposure]]></title>
      <description><![CDATA[CORS misconfigurations are one of the most common web security issues. They silently expose your APIs to cross-origin data theft.]]></description>
      <link>https://safeguard.sh/resources/blog/cors-misconfiguration-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cors-misconfiguration-exploitation</guid>
      <pubDate>Mon, 12 Sep 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Harbor Registry Security Configuration: A Complete Hardening Guide]]></title>
      <description><![CDATA[Harbor is the most popular open-source container registry. Its security features are powerful but require deliberate configuration to be effective.]]></description>
      <link>https://safeguard.sh/resources/blog/harbor-registry-security-configuration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/harbor-registry-security-configuration</guid>
      <pubDate>Mon, 12 Sep 2022 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Canary Deployments and Security Monitoring]]></title>
      <description><![CDATA[Using canary deployment strategies to catch security regressions before they reach all users, with monitoring patterns for security-relevant metrics.]]></description>
      <link>https://safeguard.sh/resources/blog/canary-deployments-security-monitoring</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/canary-deployments-security-monitoring</guid>
      <pubDate>Mon, 12 Sep 2022 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Path Traversal in Dependency Installation: Writing Files Where They Should Not Go]]></title>
      <description><![CDATA[Package archives can contain path traversal sequences that write files outside the expected directory. Most developers never check for this.]]></description>
      <link>https://safeguard.sh/resources/blog/path-traversal-dependency-installation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/path-traversal-dependency-installation</guid>
      <pubDate>Thu, 08 Sep 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Rust Supply Chain Security: How crates.io Stacks Up Against npm and PyPI]]></title>
      <description><![CDATA[Rust's crates.io registry has design advantages for supply chain security, but it's not immune. Here's an honest assessment of the Rust ecosystem.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-supply-chain-security-crates-io</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-supply-chain-security-crates-io</guid>
      <pubDate>Thu, 08 Sep 2022 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Software Escrow Agreements: Security Implications You Should Negotiate]]></title>
      <description><![CDATA[Software escrow protects you if a vendor goes under. But the security details in the agreement determine whether the escrow is actually usable.]]></description>
      <link>https://safeguard.sh/resources/blog/software-escrow-agreements-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-escrow-agreements-security</guid>
      <pubDate>Thu, 08 Sep 2022 10:00:00 GMT</pubDate>
      <category>Security Strategy</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Linux Kernel Supply Chain Security: How the World's Largest Project Protects Itself]]></title>
      <description><![CDATA[The Linux kernel is the most critical open source project on earth. Its supply chain security practices offer lessons for every project, but also reveal challenges that scale creates.]]></description>
      <link>https://safeguard.sh/resources/blog/linux-kernel-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/linux-kernel-supply-chain-security</guid>
      <pubDate>Thu, 08 Sep 2022 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Security Misconfiguration Checklist: The Low-Hanging Fruit Attackers Love]]></title>
      <description><![CDATA[Misconfigurations are the easiest vulnerabilities to find and exploit. Here is a practical checklist for web servers, frameworks, cloud services, and databases.]]></description>
      <link>https://safeguard.sh/resources/blog/security-misconfiguration-checklist</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-misconfiguration-checklist</guid>
      <pubDate>Thu, 08 Sep 2022 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[SSRF Exploitation in Cloud Environments]]></title>
      <description><![CDATA[Server-Side Request Forgery is especially dangerous in cloud environments where metadata services expose credentials and configuration. This guide covers SSRF exploitation techniques and defenses specific to AWS, GCP, and Azure.]]></description>
      <link>https://safeguard.sh/resources/blog/ssrf-exploitation-cloud-environments</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ssrf-exploitation-cloud-environments</guid>
      <pubDate>Mon, 05 Sep 2022 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[The State of Software Supply Chain Attacks: Mid-2022 Report]]></title>
      <description><![CDATA[By mid-2022, supply chain attacks had surged 742% over the previous three years. Here's the data, the trends, and what defenders need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-attacks-state-of-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-attacks-state-of-2022</guid>
      <pubDate>Thu, 01 Sep 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[SLSA vs SSDF vs S2C2F: Framework Comparison]]></title>
      <description><![CDATA[Three supply chain integrity frameworks. Three different authors. Three different audiences. A practical comparison of SLSA, NIST SSDF, and Microsoft S2C2F for teams picking one.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-integrity-framework-comparison-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-integrity-framework-comparison-2022</guid>
      <pubDate>Tue, 30 Aug 2022 12:00:00 GMT</pubDate>
      <category>Regulatory Compliance</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Build Artifact Integrity Verification: From Source to Deployment]]></title>
      <description><![CDATA[If you cannot verify that your deployed artifact matches your reviewed source code, your entire code review process is security theater. Here is how to close that gap.]]></description>
      <link>https://safeguard.sh/resources/blog/build-artifact-integrity-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/build-artifact-integrity-verification</guid>
      <pubDate>Sun, 28 Aug 2022 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[LastPass Breach: How a Compromised Developer Environment Exposed Millions]]></title>
      <description><![CDATA[LastPass disclosed that an attacker accessed their development environment for four days. The full impact wouldn't be known for months.]]></description>
      <link>https://safeguard.sh/resources/blog/lastpass-security-breach-developer-environment</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lastpass-security-breach-developer-environment</guid>
      <pubDate>Thu, 25 Aug 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Plex Data Breach: 20 Million Users Forced to Reset Passwords]]></title>
      <description><![CDATA[A breach of Plex's systems exposed usernames, emails, and hashed passwords for approximately 20 million users, forcing the streaming platform to trigger a mass password reset.]]></description>
      <link>https://safeguard.sh/resources/blog/plex-data-breach-august-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/plex-data-breach-august-2022</guid>
      <pubDate>Wed, 24 Aug 2022 10:00:00 GMT</pubDate>
      <category>Data Breach</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GitLab Critical RCE (CVE-2022-2884): Remote Code Execution via GitHub Import]]></title>
      <description><![CDATA[A critical vulnerability in GitLab's GitHub import feature allowed authenticated attackers to execute arbitrary code on the server. The flaw highlighted risks in platform migration features.]]></description>
      <link>https://safeguard.sh/resources/blog/gitlab-critical-vulnerability-cve-2022-2884</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/gitlab-critical-vulnerability-cve-2022-2884</guid>
      <pubDate>Mon, 22 Aug 2022 13:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Setting Up Dependency Scanning on GitHub]]></title>
      <description><![CDATA[A hands-on walkthrough for configuring automated dependency scanning in your GitHub repositories, from Dependabot alerts to custom CI workflows.]]></description>
      <link>https://safeguard.sh/resources/blog/setting-up-dependency-scanning-github</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/setting-up-dependency-scanning-github</guid>
      <pubDate>Mon, 22 Aug 2022 11:00:00 GMT</pubDate>
      <category>How-To Guide</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Infrastructure as Code Security: Scanning Terraform, CloudFormation, and Kubernetes Manifests]]></title>
      <description><![CDATA[IaC scanning catches misconfigurations before they reach production. This guide covers tools, techniques, and integration patterns for Terraform, CloudFormation, and Kubernetes.]]></description>
      <link>https://safeguard.sh/resources/blog/infrastructure-as-code-security-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/infrastructure-as-code-security-scanning</guid>
      <pubDate>Mon, 22 Aug 2022 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Building a Security Team from Scratch]]></title>
      <description><![CDATA[A practical guide to hiring your first security engineers, defining roles, and building a security function that scales with your organization.]]></description>
      <link>https://safeguard.sh/resources/blog/building-security-team-from-scratch</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/building-security-team-from-scratch</guid>
      <pubDate>Mon, 22 Aug 2022 00:00:00 GMT</pubDate>
      <category>Organizational Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Malicious GitHub Commits: The Overlooked Supply Chain Attack Vector]]></title>
      <description><![CDATA[Attackers can impersonate any committer on GitHub, inject malicious code through PRs, and exploit lax review processes. Here's the risk.]]></description>
      <link>https://safeguard.sh/resources/blog/malicious-github-commits-supply-chain-risk</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/malicious-github-commits-supply-chain-risk</guid>
      <pubDate>Sat, 20 Aug 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security in Banking: A Practical Guide]]></title>
      <description><![CDATA[Banks face unique software supply chain risks. This guide covers real threats, regulatory expectations, and what security teams should actually be doing.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-security-banking</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-security-banking</guid>
      <pubDate>Sat, 20 Aug 2022 09:00:00 GMT</pubDate>
      <category>Industry Guides</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Security Bounty Programs: Do They Actually Work?]]></title>
      <description><![CDATA[Bug bounty programs for open source projects promise market-driven vulnerability discovery. The reality is more complicated, with perverse incentives, quality problems, and funding gaps.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-security-bounty-programs</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-security-bounty-programs</guid>
      <pubDate>Thu, 18 Aug 2022 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Supply Chain Security for Government Agencies]]></title>
      <description><![CDATA[Government agencies face unique software supply chain threats. Here's how federal and state organizations can protect critical infrastructure from compromise.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-security-for-government-agencies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-security-for-government-agencies</guid>
      <pubDate>Thu, 18 Aug 2022 00:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Securing GitHub Actions: Hardening Your CI/CD Supply Chain]]></title>
      <description><![CDATA[GitHub Actions is a powerful CI/CD platform — and a significant attack surface. Here's how to lock it down against supply chain threats.]]></description>
      <link>https://safeguard.sh/resources/blog/securing-github-actions-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/securing-github-actions-supply-chain</guid>
      <pubDate>Mon, 15 Aug 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Security Metrics That Matter: A CISO Guide]]></title>
      <description><![CDATA[Stop reporting vanity metrics. Here are the security measurements that actually inform decisions, demonstrate program effectiveness, and earn board-level credibility.]]></description>
      <link>https://safeguard.sh/resources/blog/security-metrics-that-matter-ciso-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-metrics-that-matter-ciso-guide</guid>
      <pubDate>Mon, 15 Aug 2022 09:00:00 GMT</pubDate>
      <category>Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[eBPF for Security Monitoring: What It Can and Cannot Do]]></title>
      <description><![CDATA[eBPF is being called the future of security observability. It is genuinely powerful, but it is not a magic bullet for runtime security.]]></description>
      <link>https://safeguard.sh/resources/blog/ebpf-security-monitoring-applications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ebpf-security-monitoring-applications</guid>
      <pubDate>Fri, 12 Aug 2022 10:00:00 GMT</pubDate>
      <category>Runtime Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Docker Image Layer Security Analysis: What Lurks Beneath Your Containers]]></title>
      <description><![CDATA[Every Docker image is a stack of layers, and each one can introduce vulnerabilities. Learn how to dissect image layers for security risks and what tools actually help.]]></description>
      <link>https://safeguard.sh/resources/blog/docker-image-layer-security-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/docker-image-layer-security-analysis</guid>
      <pubDate>Fri, 12 Aug 2022 00:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Trivy for SBOM Generation and Vulnerability Scanning]]></title>
      <description><![CDATA[Trivy combines SBOM generation with vulnerability scanning in a single tool. Here's how to use both capabilities effectively.]]></description>
      <link>https://safeguard.sh/resources/blog/trivy-sbom-generation-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/trivy-sbom-generation-scanning</guid>
      <pubDate>Fri, 12 Aug 2022 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Zimbra CVE-2022-37042: Authentication Bypass in a Widely Used Email Platform]]></title>
      <description><![CDATA[CVE-2022-37042 allowed unauthenticated attackers to upload web shells to Zimbra email servers. Over 1,000 servers were compromised before most admins knew about it.]]></description>
      <link>https://safeguard.sh/resources/blog/zimbra-cve-2022-37042-authentication-bypass</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zimbra-cve-2022-37042-authentication-bypass</guid>
      <pubDate>Wed, 10 Aug 2022 10:00:00 GMT</pubDate>
      <category>Zero-Day Exploits</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[0ktapus: The Phishing Campaign That Hit Cloudflare, Twilio, and 130+ Organizations]]></title>
      <description><![CDATA[A single phishing campaign compromised over 130 companies including Cloudflare and Twilio. Here's how the 0ktapus attack chain worked.]]></description>
      <link>https://safeguard.sh/resources/blog/cloudflare-twilio-0ktapus-phishing-campaign</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cloudflare-twilio-0ktapus-phishing-campaign</guid>
      <pubDate>Mon, 08 Aug 2022 10:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Docker Security Best Practices for Developers]]></title>
      <description><![CDATA[Practical Docker security from image building to runtime, covering multi-stage builds, user namespaces, and image scanning.]]></description>
      <link>https://safeguard.sh/resources/blog/docker-security-best-practices-developers</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/docker-security-best-practices-developers</guid>
      <pubDate>Mon, 08 Aug 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[pip Install Hooks Security Risks: Code Execution During Package Installation]]></title>
      <description><![CDATA[Running pip install can execute arbitrary code on your machine before you ever import the package. Here is how install hooks create risk.]]></description>
      <link>https://safeguard.sh/resources/blog/pip-install-hooks-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pip-install-hooks-security-risks</guid>
      <pubDate>Mon, 08 Aug 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Startup Security at Seed Stage: What to Prioritize When Resources Are Scarce]]></title>
      <description><![CDATA[You have five engineers, zero security staff, and a product to ship. Here is the minimum viable security program that protects your startup without killing your velocity.]]></description>
      <link>https://safeguard.sh/resources/blog/startup-security-seed-stage-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/startup-security-seed-stage-guide</guid>
      <pubDate>Mon, 08 Aug 2022 00:00:00 GMT</pubDate>
      <category>Startup Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Mutation Testing for Security Validation: Testing Your Tests]]></title>
      <description><![CDATA[Mutation testing measures whether your security tests actually catch bugs by introducing small changes to code and checking if tests fail. Here is how to apply it to security-critical code.]]></description>
      <link>https://safeguard.sh/resources/blog/mutation-testing-security-validation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mutation-testing-security-validation</guid>
      <pubDate>Fri, 05 Aug 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NoSQL Injection and MongoDB: Prevention Guide]]></title>
      <description><![CDATA[NoSQL injection attacks exploit the query languages of non-relational databases to bypass authentication, extract data, and modify records. This guide focuses on MongoDB injection with defenses applicable to all NoSQL databases.]]></description>
      <link>https://safeguard.sh/resources/blog/nosql-injection-mongodb-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nosql-injection-mongodb-prevention</guid>
      <pubDate>Fri, 05 Aug 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Reproducible Builds: The Gold Standard for Supply Chain Integrity]]></title>
      <description><![CDATA[If you can't rebuild a binary from source and get the same result, you can't verify that the binary matches the source. Reproducible builds close this fundamental trust gap.]]></description>
      <link>https://safeguard.sh/resources/blog/reproducible-builds-supply-chain-integrity</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/reproducible-builds-supply-chain-integrity</guid>
      <pubDate>Mon, 01 Aug 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[AWS Inspector V2 Container Scanning: What Changed and Why It Matters]]></title>
      <description><![CDATA[A deep look at Amazon Inspector v2 for container scanning, its improvements over v1, and how to get the most out of it.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-inspector-v2-container-scanning</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-inspector-v2-container-scanning</guid>
      <pubDate>Thu, 28 Jul 2022 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Zero Trust Architecture for the Software Supply Chain]]></title>
      <description><![CDATA[Zero trust isn't just for networks. Applying zero trust principles to your software supply chain fundamentally changes how you manage dependency risk.]]></description>
      <link>https://safeguard.sh/resources/blog/zero-trust-architecture-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zero-trust-architecture-software-supply-chain</guid>
      <pubDate>Thu, 28 Jul 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Microservices Security Architecture: A Supply Chain Perspective]]></title>
      <description><![CDATA[Microservices multiply your dependency surface. This guide covers service mesh security, inter-service authentication, and dependency management across distributed architectures.]]></description>
      <link>https://safeguard.sh/resources/blog/microservices-security-architecture-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microservices-security-architecture-guide</guid>
      <pubDate>Mon, 25 Jul 2022 11:00:00 GMT</pubDate>
      <category>Architecture</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Clippy Rust Security Lints: Catching What the Borrow Checker Misses]]></title>
      <description><![CDATA[Rust's compiler catches memory safety bugs. Clippy catches everything else -- including security anti-patterns the borrow checker does not care about.]]></description>
      <link>https://safeguard.sh/resources/blog/clippy-rust-security-lints</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/clippy-rust-security-lints</guid>
      <pubDate>Fri, 22 Jul 2022 10:00:00 GMT</pubDate>
      <category>Secure Development</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Twitter Data Breach: 5.4 Million Accounts Exposed Through an API Vulnerability]]></title>
      <description><![CDATA[An API vulnerability in Twitter allowed attackers to link phone numbers and email addresses to Twitter accounts, ultimately exposing data from 5.4 million users — and possibly over 200 million email-account pairs.]]></description>
      <link>https://safeguard.sh/resources/blog/twitter-54-million-data-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/twitter-54-million-data-breach</guid>
      <pubDate>Fri, 22 Jul 2022 10:00:00 GMT</pubDate>
      <category>Data Breach</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Brazil's LGPD and Its Implications for Software Security]]></title>
      <description><![CDATA[Brazil's data protection law creates obligations for software security and supply chain transparency. Here's what developers and vendors should know.]]></description>
      <link>https://safeguard.sh/resources/blog/brazil-lgpd-software-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/brazil-lgpd-software-security-implications</guid>
      <pubDate>Fri, 22 Jul 2022 08:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Atlassian Questions for Confluence CVE-2022-26138: A Hardcoded Password That Gave Away the Keys]]></title>
      <description><![CDATA[CVE-2022-26138 exposed a hardcoded password in the Questions for Confluence app, granting unauthenticated access to Confluence data. A preventable disaster.]]></description>
      <link>https://safeguard.sh/resources/blog/atlassian-questions-for-confluence-cve-2022-26138</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/atlassian-questions-for-confluence-cve-2022-26138</guid>
      <pubDate>Wed, 20 Jul 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[VEX Explained: How Vulnerability Exploitability Exchange Cuts Through Alert Noise]]></title>
      <description><![CDATA[VEX documents let software producers tell consumers which vulnerabilities actually affect their products. Here's how VEX works and why it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/vex-vulnerability-exploitability-exchange-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vex-vulnerability-exploitability-exchange-guide</guid>
      <pubDate>Wed, 20 Jul 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[The Open Source Software Bill of Rights]]></title>
      <description><![CDATA[As governments and enterprises demand more from open source maintainers, the community pushes back with a framework of rights. The tension between accountability and sustainability is shaping the future of open source.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-software-bill-of-rights</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-software-bill-of-rights</guid>
      <pubDate>Wed, 20 Jul 2022 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Bug Bounty Programs with a Supply Chain Focus]]></title>
      <description><![CDATA[Traditional bug bounty programs miss supply chain vulnerabilities. Here's how to design a bounty program that incentivizes researchers to hunt in your dependency chain.]]></description>
      <link>https://safeguard.sh/resources/blog/bug-bounty-programs-supply-chain-focus</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bug-bounty-programs-supply-chain-focus</guid>
      <pubDate>Mon, 18 Jul 2022 00:00:00 GMT</pubDate>
      <category>Offensive Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[NIST CSF Updates Put Supply Chain Risk Management Front and Center]]></title>
      <description><![CDATA[NIST's 2022 updates to the Cybersecurity Framework signal a major shift: supply chain risk management is no longer optional — it's a core pillar.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-csf-update-supply-chain-risk-management</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-csf-update-supply-chain-risk-management</guid>
      <pubDate>Fri, 15 Jul 2022 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Actions Security Best Practices in 2022]]></title>
      <description><![CDATA[A practical guide to hardening your GitHub Actions workflows against supply chain attacks, secret leaks, and privilege escalation.]]></description>
      <link>https://safeguard.sh/resources/blog/github-actions-security-best-practices-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-actions-security-best-practices-2022</guid>
      <pubDate>Fri, 15 Jul 2022 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Azure AD Token Theft Campaigns: A 2022 Retrospective]]></title>
      <description><![CDATA[Token theft is the quiet successor to credential phishing, and 2022 turned it into an industry. Here is what the year's Azure AD campaigns actually looked like.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-ad-token-theft-retrospective-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-ad-token-theft-retrospective-2022</guid>
      <pubDate>Thu, 14 Jul 2022 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[BlackCat/ALPHV Ransomware: Rust-Based Innovation and Supply Chain Exploitation]]></title>
      <description><![CDATA[BlackCat (ALPHV) brought Rust programming, triple extortion, and supply chain targeting to the ransomware-as-a-service model, raising the bar for both attackers and defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/blackcat-alphv-ransomware-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/blackcat-alphv-ransomware-supply-chain</guid>
      <pubDate>Tue, 12 Jul 2022 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[JavaScript Dependency Security: The Complete Guide]]></title>
      <description><![CDATA[A thorough walkthrough of securing your JavaScript dependency tree, from lockfile hygiene to automated auditing and runtime protections.]]></description>
      <link>https://safeguard.sh/resources/blog/javascript-dependency-security-complete-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/javascript-dependency-security-complete-guide</guid>
      <pubDate>Tue, 12 Jul 2022 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[NGINX Security Configuration Guide for Production Deployments]]></title>
      <description><![CDATA[NGINX powers a third of the internet. Its default configuration is optimized for getting started, not for production security. Here is the gap.]]></description>
      <link>https://safeguard.sh/resources/blog/nginx-security-configuration-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nginx-security-configuration-guide</guid>
      <pubDate>Tue, 12 Jul 2022 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Notary v2 Content Trust: A Practical Implementation Guide]]></title>
      <description><![CDATA[Docker Content Trust never gained traction. Notary v2, now called Notation, is the replacement. Here is how to implement it and what has changed.]]></description>
      <link>https://safeguard.sh/resources/blog/notary-v2-content-trust-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/notary-v2-content-trust-guide</guid>
      <pubDate>Tue, 12 Jul 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Memory Safety Bugs in C/C++ Dependencies: The Hidden Risk in Your Software Supply Chain]]></title>
      <description><![CDATA[C and C++ libraries still power critical infrastructure everywhere. Their memory safety issues are your problem whether you write C or not.]]></description>
      <link>https://safeguard.sh/resources/blog/memory-safety-bugs-c-cpp-dependencies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/memory-safety-bugs-c-cpp-dependencies</guid>
      <pubDate>Fri, 08 Jul 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Protocol Buffer Security Considerations Beyond Serialization]]></title>
      <description><![CDATA[Protobuf is everywhere in modern infrastructure. Its security implications go beyond just serialization format choice. Here is what to watch.]]></description>
      <link>https://safeguard.sh/resources/blog/protocol-buffer-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/protocol-buffer-security-considerations</guid>
      <pubDate>Fri, 08 Jul 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CDN Supply Chain Security Risks You Should Know]]></title>
      <description><![CDATA[Content delivery networks serve billions of software assets daily. When a CDN is compromised, the blast radius is enormous. Here's what CDN supply chain risks look like and how to defend against them.]]></description>
      <link>https://safeguard.sh/resources/blog/cdn-supply-chain-security-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cdn-supply-chain-security-risks</guid>
      <pubDate>Fri, 08 Jul 2022 00:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[SAST vs DAST vs IAST: Which Application Security Testing Approach Fits Your Pipeline?]]></title>
      <description><![CDATA[A practical comparison of SAST, DAST, and IAST — when to use each, where they overlap, and why most teams need more than one.]]></description>
      <link>https://safeguard.sh/resources/blog/sast-vs-dast-vs-iast-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sast-vs-dast-vs-iast-comparison</guid>
      <pubDate>Fri, 08 Jul 2022 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Dark Web Monitoring for Supply Chain Threats]]></title>
      <description><![CDATA[Software supply chain credentials, stolen signing keys, and zero-day exploits for build tools are traded on dark web forums. Monitoring these channels provides early warning of supply chain attacks.]]></description>
      <link>https://safeguard.sh/resources/blog/dark-web-monitoring-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dark-web-monitoring-supply-chain</guid>
      <pubDate>Tue, 05 Jul 2022 10:00:00 GMT</pubDate>
      <category>Threat Intelligence</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[How to Create Your First SBOM]]></title>
      <description><![CDATA[A practical, step-by-step guide to generating your first Software Bill of Materials using open-source tools and integrating it into your development workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/how-to-create-your-first-sbom</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/how-to-create-your-first-sbom</guid>
      <pubDate>Tue, 05 Jul 2022 10:00:00 GMT</pubDate>
      <category>How-To Guide</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[npm Lockfile Injection Attacks: How Tampered package-lock.json Files Compromise Builds]]></title>
      <description><![CDATA[Lockfile injection is a subtle supply chain attack where malicious changes to package-lock.json redirect dependency resolution to attacker-controlled packages. Here is how it works and how to detect it.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-lockfile-injection-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-lockfile-injection-attacks</guid>
      <pubDate>Tue, 05 Jul 2022 10:00:00 GMT</pubDate>
      <category>Software Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Retbleed: The Spectre Variant That Haunts Modern CPUs (CVE-2022-29900)]]></title>
      <description><![CDATA[Retbleed exploits return instructions to bypass Spectre mitigations on AMD and Intel processors. Here's what it means for your infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/retbleed-spectre-variant-cve-2022-29900-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/retbleed-spectre-variant-cve-2022-29900-analysis</guid>
      <pubDate>Tue, 05 Jul 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[WebAssembly Security: A Deep Dive into the Sandbox Model]]></title>
      <description><![CDATA[WebAssembly promises near-native performance with a strong security sandbox. But the sandbox model has nuances that developers and security teams must understand to avoid dangerous assumptions.]]></description>
      <link>https://safeguard.sh/resources/blog/webassembly-security-sandbox-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/webassembly-security-sandbox-analysis</guid>
      <pubDate>Tue, 05 Jul 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Docker Scout for Container Security Analysis: A Practical Guide]]></title>
      <description><![CDATA[Docker Scout brings vulnerability scanning directly into the Docker CLI. Here is what it actually catches, where it falls short, and how to integrate it into your workflow.]]></description>
      <link>https://safeguard.sh/resources/blog/docker-scout-container-analysis-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/docker-scout-container-analysis-guide</guid>
      <pubDate>Tue, 05 Jul 2022 00:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Governance: Building an Enterprise Framework]]></title>
      <description><![CDATA[Ad-hoc open source usage creates legal, security, and operational risk. This guide walks through building a governance framework that enables developers while managing risk.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-governance-enterprise-framework</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-governance-enterprise-framework</guid>
      <pubDate>Tue, 28 Jun 2022 11:00:00 GMT</pubDate>
      <category>Governance</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[India's CERT-In Cybersecurity Directives: Six-Hour Reporting and Beyond]]></title>
      <description><![CDATA[India's CERT-In directives mandate six-hour incident reporting and strict logging requirements. Here's what organizations operating in India need to know.]]></description>
      <link>https://safeguard.sh/resources/blog/india-cert-in-cyber-security-directives</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/india-cert-in-cyber-security-directives</guid>
      <pubDate>Tue, 28 Jun 2022 10:00:00 GMT</pubDate>
      <category>Compliance</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Update Strategies for Large Codebases]]></title>
      <description><![CDATA[At scale, keeping dependencies current is not a weekend chore — it is an engineering discipline. The wrong update strategy creates either a mountain of tech debt or a pipeline permanently broken by cascading upgrades.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-update-strategies-for-large-codebases</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-update-strategies-for-large-codebases</guid>
      <pubDate>Sat, 25 Jun 2022 09:00:00 GMT</pubDate>
      <category>Software Supply Chain</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[The GitHub Codespaces Security Model, Examined]]></title>
      <description><![CDATA[GitHub Codespaces has gone GA and is about to become the dev environment standard. Here is a close read of its security model — including what it does not solve.]]></description>
      <link>https://safeguard.sh/resources/blog/github-codespaces-security-model-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-codespaces-security-model-2022</guid>
      <pubDate>Wed, 22 Jun 2022 12:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Terraform Security Scanning: What to Scan, When, and How]]></title>
      <description><![CDATA[A practical guide to integrating security scanning into your Terraform workflow without destroying developer productivity.]]></description>
      <link>https://safeguard.sh/resources/blog/terraform-security-scanning-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/terraform-security-scanning-best-practices</guid>
      <pubDate>Wed, 22 Jun 2022 10:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Managing End-of-Life Software Dependencies]]></title>
      <description><![CDATA[Every dependency eventually reaches end of life. Here is a practical framework for identifying, tracking, and migrating away from EOL software before it becomes a security liability.]]></description>
      <link>https://safeguard.sh/resources/blog/managing-eol-software-dependencies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/managing-eol-software-dependencies</guid>
      <pubDate>Wed, 22 Jun 2022 09:00:00 GMT</pubDate>
      <category>Dependency Management</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Secrets Management: Preventing Credential Leaks in Your Software Supply Chain]]></title>
      <description><![CDATA[Hardcoded credentials remain the most common source of breaches. Despite a decade of tooling improvements, secrets keep leaking through source code, container images, CI logs, and dependency configurations. Here is how to actually fix it.]]></description>
      <link>https://safeguard.sh/resources/blog/secrets-management-preventing-credential-leaks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/secrets-management-preventing-credential-leaks</guid>
      <pubDate>Wed, 22 Jun 2022 09:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Environment Variable Injection in CI/CD: The Invisible Attack Surface]]></title>
      <description><![CDATA[CI/CD pipelines trust environment variables implicitly. Injecting or modifying them can hijack builds, steal secrets, and compromise deployments.]]></description>
      <link>https://safeguard.sh/resources/blog/environment-variable-injection-cicd</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/environment-variable-injection-cicd</guid>
      <pubDate>Mon, 20 Jun 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[ESLint Security Rules Configuration: A Practical Guide]]></title>
      <description><![CDATA[ESLint can catch security issues before they reach production. Here is how to configure security-focused rules that actually help without drowning you in noise.]]></description>
      <link>https://safeguard.sh/resources/blog/eslint-security-rules-configuration</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/eslint-security-rules-configuration</guid>
      <pubDate>Mon, 20 Jun 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Ruby Gems Supply Chain Security]]></title>
      <description><![CDATA[Protecting your Ruby applications from gem-based supply chain attacks with Bundler security features, gem signing, and auditing.]]></description>
      <link>https://safeguard.sh/resources/blog/ruby-gems-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ruby-gems-supply-chain-security</guid>
      <pubDate>Mon, 20 Jun 2022 10:00:00 GMT</pubDate>
      <category>Dependency Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Securing Terraform Infrastructure as Code: A Practitioner's Guide]]></title>
      <description><![CDATA[Your Terraform code defines your production infrastructure. If an attacker compromises your HCL files, state files, or provider plugins, they do not just get access — they get the keys to rebuild your entire environment on their terms.]]></description>
      <link>https://safeguard.sh/resources/blog/securing-terraform-infrastructure-as-code</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/securing-terraform-infrastructure-as-code</guid>
      <pubDate>Sat, 18 Jun 2022 09:00:00 GMT</pubDate>
      <category>Infrastructure Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Flux CD GitOps Security Practices]]></title>
      <description><![CDATA[Hardening Flux CD deployments with multi-tenancy, RBAC, secret encryption, and image verification for secure GitOps workflows.]]></description>
      <link>https://safeguard.sh/resources/blog/flux-cd-gitops-security-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/flux-cd-gitops-security-practices</guid>
      <pubDate>Sat, 18 Jun 2022 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Building a Supply Chain Risk Appetite Framework]]></title>
      <description><![CDATA[Every organization accepts some supply chain risk. The question is whether that acceptance is deliberate and documented or accidental and invisible.]]></description>
      <link>https://safeguard.sh/resources/blog/supply-chain-risk-appetite-framework</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/supply-chain-risk-appetite-framework</guid>
      <pubDate>Sat, 18 Jun 2022 00:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[CPE Naming Convention and the Vulnerability Matching Problem]]></title>
      <description><![CDATA[CPE is the backbone of NVD vulnerability matching, and it is deeply flawed. Understanding its limitations is essential for accurate vulnerability management.]]></description>
      <link>https://safeguard.sh/resources/blog/cpe-naming-convention-vulnerability-matching</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cpe-naming-convention-vulnerability-matching</guid>
      <pubDate>Wed, 15 Jun 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Shifting Left Without Slowing Down]]></title>
      <description><![CDATA[How to integrate security earlier in the development lifecycle without turning your CI pipeline into a bottleneck that developers hate.]]></description>
      <link>https://safeguard.sh/resources/blog/shifting-left-without-slowing-down</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/shifting-left-without-slowing-down</guid>
      <pubDate>Wed, 15 Jun 2022 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The OWASP Top 10 (2021) Through a Supply Chain Security Lens]]></title>
      <description><![CDATA[The 2021 OWASP Top 10 added supply chain risks for the first time. Here is what each category means when your code is mostly someone else's code.]]></description>
      <link>https://safeguard.sh/resources/blog/owasp-top-10-2021-supply-chain-perspective</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/owasp-top-10-2021-supply-chain-perspective</guid>
      <pubDate>Wed, 15 Jun 2022 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[The Log4Shell Response Playbook Six Months In]]></title>
      <description><![CDATA[Six months after CVE-2021-44228 broke the internet, here is what worked, what didn't, and the response patterns security teams should keep as muscle memory.]]></description>
      <link>https://safeguard.sh/resources/blog/log4shell-response-playbook-six-months-in</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/log4shell-response-playbook-six-months-in</guid>
      <pubDate>Sun, 12 Jun 2022 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Linux Distribution Package Signing: How It Actually Works]]></title>
      <description><![CDATA[Package signing is the backbone of Linux software distribution security. Most teams trust it blindly without understanding the verification chain they depend on.]]></description>
      <link>https://safeguard.sh/resources/blog/linux-distribution-package-signing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/linux-distribution-package-signing</guid>
      <pubDate>Sun, 12 Jun 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Mobile App Store Security Bypass: How Malicious Apps Evade Review]]></title>
      <description><![CDATA[App store review processes catch most malware. But the bypass techniques that work reveal systematic gaps in mobile supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/mobile-app-store-security-bypass</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mobile-app-store-security-bypass</guid>
      <pubDate>Sun, 12 Jun 2022 10:00:00 GMT</pubDate>
      <category>Mobile Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Electron App Supply Chain Security: Desktop Apps Built on Web Dependencies]]></title>
      <description><![CDATA[Electron apps ship a full Chromium browser and Node.js runtime to the desktop. That means every web supply chain risk becomes a desktop attack surface — with elevated privileges.]]></description>
      <link>https://safeguard.sh/resources/blog/electron-app-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/electron-app-supply-chain-security</guid>
      <pubDate>Sun, 12 Jun 2022 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Follina (CVE-2022-30190): The Microsoft Zero-Day That Bypassed Macro Protections]]></title>
      <description><![CDATA[A Word document, no macros enabled, and full remote code execution. Follina exploited the Microsoft Support Diagnostic Tool via ms-msdt protocol handlers, rendering years of macro-blocking defenses irrelevant.]]></description>
      <link>https://safeguard.sh/resources/blog/follina-cve-2022-30190-microsoft-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/follina-cve-2022-30190-microsoft-zero-day</guid>
      <pubDate>Fri, 10 Jun 2022 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Container Runtime Security Monitoring: Catching What Scanners Miss]]></title>
      <description><![CDATA[Image scanning finds known vulnerabilities before deployment. Runtime monitoring catches actual exploitation, zero-days, and behavioral anomalies after deployment. You need both.]]></description>
      <link>https://safeguard.sh/resources/blog/container-runtime-security-monitoring</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-runtime-security-monitoring</guid>
      <pubDate>Wed, 08 Jun 2022 11:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[AWS Supply Chain Security Best Practices You Should Adopt Today]]></title>
      <description><![CDATA[A practical guide to securing your software supply chain on AWS, from ECR image provenance to CodePipeline hardening.]]></description>
      <link>https://safeguard.sh/resources/blog/aws-supply-chain-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/aws-supply-chain-security-best-practices</guid>
      <pubDate>Wed, 08 Jun 2022 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[TLS Configuration Security Audit: What to Check and How]]></title>
      <description><![CDATA[A misconfigured TLS setup can be worse than no encryption at all because it creates false confidence. Here is how to audit your TLS configuration properly.]]></description>
      <link>https://safeguard.sh/resources/blog/tls-configuration-security-audit</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/tls-configuration-security-audit</guid>
      <pubDate>Wed, 08 Jun 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Supply Chain Policy Engines: Enforcing What Gets Deployed]]></title>
      <description><![CDATA[Scanning for vulnerabilities means nothing if you cannot enforce the results. Supply chain policy engines in Kubernetes turn security findings into hard deployment gates.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-supply-chain-policy-engine</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-supply-chain-policy-engine</guid>
      <pubDate>Wed, 08 Jun 2022 00:00:00 GMT</pubDate>
      <category>Kubernetes Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Security Headers Implementation Checklist: Hardening Your Web Application]]></title>
      <description><![CDATA[HTTP security headers are your first line of defense against XSS, clickjacking, and data injection attacks. Here is a practical implementation checklist with correct configurations.]]></description>
      <link>https://safeguard.sh/resources/blog/security-headers-implementation-checklist</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/security-headers-implementation-checklist</guid>
      <pubDate>Sun, 05 Jun 2022 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Software-Defined Perimeters for Supply Chain Security]]></title>
      <description><![CDATA[Software-Defined Perimeters can isolate build systems, artifact repositories, and deployment pipelines from unauthorized access. Here is how SDP applies to supply chain security.]]></description>
      <link>https://safeguard.sh/resources/blog/software-defined-perimeter-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-defined-perimeter-supply-chain</guid>
      <pubDate>Sun, 05 Jun 2022 10:00:00 GMT</pubDate>
      <category>Network Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Hardware Supply Chain Trust Boundaries]]></title>
      <description><![CDATA[Hardware travels through dozens of hands before reaching your data center. Understanding and enforcing trust boundaries across the hardware supply chain is essential for building secure systems.]]></description>
      <link>https://safeguard.sh/resources/blog/hardware-supply-chain-trust-boundaries</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/hardware-supply-chain-trust-boundaries</guid>
      <pubDate>Sun, 05 Jun 2022 00:00:00 GMT</pubDate>
      <category>Hardware Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[SBOM 101: A Complete Beginner's Guide to Software Bill of Materials]]></title>
      <description><![CDATA[Everything you need to know about Software Bills of Materials -- what they are, why they matter, and how to start generating them for your projects.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-101-complete-beginners-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-101-complete-beginners-guide</guid>
      <pubDate>Sun, 05 Jun 2022 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Confluence Zero-Day (CVE-2022-26134): Atlassian's OGNL Injection Crisis]]></title>
      <description><![CDATA[An unauthenticated RCE zero-day in Confluence Server was being actively exploited before Atlassian even knew about it. The vulnerability affected virtually every on-premise Confluence installation.]]></description>
      <link>https://safeguard.sh/resources/blog/confluence-cve-2022-26134-atlassian-zero-day</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/confluence-cve-2022-26134-atlassian-zero-day</guid>
      <pubDate>Fri, 03 Jun 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Evaluating Open Source Alternatives Through a Security Lens]]></title>
      <description><![CDATA[When choosing between open source packages that provide the same functionality, security factors should weigh as heavily as features. Here is a practical evaluation framework.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-alternative-evaluation-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-alternative-evaluation-security</guid>
      <pubDate>Sat, 28 May 2022 09:00:00 GMT</pubDate>
      <category>Dependency Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Software Provenance Tracking: From Source to Production]]></title>
      <description><![CDATA[Software provenance answers the question: where did this code come from, who built it, and can I trust it? In 2022, provenance tracking moved from academic concept to practical necessity.]]></description>
      <link>https://safeguard.sh/resources/blog/software-provenance-tracking-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-provenance-tracking-best-practices</guid>
      <pubDate>Sat, 28 May 2022 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Shield Health Group Data Breach: 2 Million Patient Records Exposed]]></title>
      <description><![CDATA[A breach at Shield Health Group, a Massachusetts medical imaging provider, exposed personal and medical data of approximately 2 million patients — highlighting the healthcare sector's persistent vulnerability.]]></description>
      <link>https://safeguard.sh/resources/blog/shield-health-group-data-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/shield-health-group-data-breach</guid>
      <pubDate>Fri, 27 May 2022 10:00:00 GMT</pubDate>
      <category>Healthcare Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Broken Access Control: The Number One Web Vulnerability and How to Fix It]]></title>
      <description><![CDATA[Access control moved to the top of the OWASP Top 10 in 2021. Here is why it is so hard to get right and what a solid authorization architecture looks like.]]></description>
      <link>https://safeguard.sh/resources/blog/broken-access-control-prevention-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/broken-access-control-prevention-guide</guid>
      <pubDate>Wed, 25 May 2022 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[General Motors Credential Stuffing Attack: Loyalty Points Theft at Scale]]></title>
      <description><![CDATA[Attackers used credential stuffing to compromise GM customer accounts, stealing reward points and personal data — a reminder that password reuse remains one of the most exploitable habits in cybersecurity.]]></description>
      <link>https://safeguard.sh/resources/blog/general-motors-credential-stuffing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/general-motors-credential-stuffing</guid>
      <pubDate>Tue, 24 May 2022 10:00:00 GMT</pubDate>
      <category>Credential Attacks</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Red Hat JBoss Vulnerability Exploitation: The Persistent Threat of Java Middleware]]></title>
      <description><![CDATA[JBoss application servers have been a recurring target for attackers. From deserialization flaws to exposed management interfaces, the middleware layer remains a critical attack surface.]]></description>
      <link>https://safeguard.sh/resources/blog/red-hat-jboss-vulnerability-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/red-hat-jboss-vulnerability-exploitation</guid>
      <pubDate>Sun, 22 May 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Funding Models and Their Impact on Security]]></title>
      <description><![CDATA[The way open source projects get funded directly shapes their security outcomes. From corporate sponsorship to bounty programs, each model creates different incentives and blind spots.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-funding-models-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-funding-models-security</guid>
      <pubDate>Sun, 22 May 2022 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PyPI Supply Chain Attacks: The ctx Package Compromise]]></title>
      <description><![CDATA[The ctx package on PyPI was hijacked to steal environment variables from developer machines. The attack exploited an expired domain to take over a maintainer account — a novel and repeatable technique.]]></description>
      <link>https://safeguard.sh/resources/blog/pypi-supply-chain-attacks-ctx-package</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pypi-supply-chain-attacks-ctx-package</guid>
      <pubDate>Fri, 20 May 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Image Parsing Vulnerabilities in Dependencies: The Pixel-Level Threat]]></title>
      <description><![CDATA[Every application that processes images depends on parsing libraries with a long history of memory corruption bugs. Here is what is at stake.]]></description>
      <link>https://safeguard.sh/resources/blog/image-parsing-vulnerabilities-dependencies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/image-parsing-vulnerabilities-dependencies</guid>
      <pubDate>Wed, 18 May 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Secure Coding Practices: A Developer's Guide]]></title>
      <description><![CDATA[Practical secure coding habits every developer should build, covering input validation, authentication, dependency management, and more.]]></description>
      <link>https://safeguard.sh/resources/blog/secure-coding-practices-developers-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/secure-coding-practices-developers-guide</guid>
      <pubDate>Wed, 18 May 2022 10:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Why Dependency Pinning Alone Is Not Enough]]></title>
      <description><![CDATA[Pinning dependencies feels like a complete answer to supply chain risk. It is not — and the gap between pinning and real integrity matters more in 2022 than ever.]]></description>
      <link>https://safeguard.sh/resources/blog/why-dependency-pinning-alone-is-not-enough</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/why-dependency-pinning-alone-is-not-enough</guid>
      <pubDate>Tue, 17 May 2022 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Maven Central Supply Chain Risks: Securing the Java Ecosystem]]></title>
      <description><![CDATA[Maven Central is the backbone of the Java ecosystem, serving billions of artifact downloads annually. Its unique trust model and dependency resolution create supply chain risks that Java teams must understand.]]></description>
      <link>https://safeguard.sh/resources/blog/maven-central-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/maven-central-supply-chain-risks</guid>
      <pubDate>Sun, 15 May 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[OCI Artifact Signing Standards: Making Sense of the Landscape]]></title>
      <description><![CDATA[Container image signing has gone through multiple iterations. Here is where the OCI standards stand now and what you need to implement.]]></description>
      <link>https://safeguard.sh/resources/blog/oci-artifact-signing-standards</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/oci-artifact-signing-standards</guid>
      <pubDate>Thu, 12 May 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[SAML Security in a Supply Chain Context]]></title>
      <description><![CDATA[SAML is the authentication backbone for enterprise SSO. Its XML-based attack surface makes it a high-value target for supply chain compromise.]]></description>
      <link>https://safeguard.sh/resources/blog/saml-security-supply-chain-context</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/saml-security-supply-chain-context</guid>
      <pubDate>Thu, 12 May 2022 10:00:00 GMT</pubDate>
      <category>Identity Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Zyxel Firewall CVE-2022-30525: Unauthenticated Command Injection in Your Perimeter Defense]]></title>
      <description><![CDATA[CVE-2022-30525 gave attackers unauthenticated OS command injection on Zyxel firewalls. The irony of a firewall being the weakest point in your network security.]]></description>
      <link>https://safeguard.sh/resources/blog/zyxel-firewall-cve-2022-30525-rce</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zyxel-firewall-cve-2022-30525-rce</guid>
      <pubDate>Thu, 12 May 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Docker Container Escape Vulnerabilities: Techniques and Defenses]]></title>
      <description><![CDATA[Containers are not VMs. When an attacker escapes a container, they own the host — and potentially every other container running on it. Here are the escape techniques you need to defend against.]]></description>
      <link>https://safeguard.sh/resources/blog/docker-container-escape-vulnerabilities</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/docker-container-escape-vulnerabilities</guid>
      <pubDate>Thu, 12 May 2022 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[CycloneDX Specification Deep Dive: Beyond the Basics]]></title>
      <description><![CDATA[CycloneDX is more than a component list. This deep dive covers services, vulnerabilities, compositions, and the parts of the spec most teams overlook.]]></description>
      <link>https://safeguard.sh/resources/blog/cyclonedx-specification-deep-dive</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cyclonedx-specification-deep-dive</guid>
      <pubDate>Thu, 12 May 2022 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[CISA SBOM Guidance: What Government Agencies Need to Know]]></title>
      <description><![CDATA[CISA's evolving SBOM requirements are reshaping how government agencies procure and manage software. Here's what the guidance says and how to operationalize it.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-sbom-guidance-for-government-agencies</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-sbom-guidance-for-government-agencies</guid>
      <pubDate>Tue, 10 May 2022 11:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Regular Expression Denial of Service (ReDoS): Detection and Prevention]]></title>
      <description><![CDATA[A single bad regex can bring down your entire application. ReDoS attacks exploit catastrophic backtracking to consume unbounded CPU time.]]></description>
      <link>https://safeguard.sh/resources/blog/regex-denial-of-service-redos-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/regex-denial-of-service-redos-prevention</guid>
      <pubDate>Sun, 08 May 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Feature Flags Security Implications]]></title>
      <description><![CDATA[Understanding the security risks of feature flag systems and how to prevent unauthorized flag manipulation, data exposure, and configuration drift.]]></description>
      <link>https://safeguard.sh/resources/blog/feature-flags-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/feature-flags-security-implications</guid>
      <pubDate>Sun, 08 May 2022 00:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[File Upload Vulnerability Prevention: A Practical Guide]]></title>
      <description><![CDATA[File upload functionality is one of the most dangerous features in web applications. This guide covers the attack vectors, bypass techniques, and layered defenses needed to handle file uploads securely.]]></description>
      <link>https://safeguard.sh/resources/blog/file-upload-vulnerability-prevention</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/file-upload-vulnerability-prevention</guid>
      <pubDate>Thu, 05 May 2022 10:00:00 GMT</pubDate>
      <category>Web Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[NIST SP 800-218 (SSDF) Final Publication: What It Means for Your Organization]]></title>
      <description><![CDATA[NIST finalized the Secure Software Development Framework in February 2022. If you sell software to the US government — or plan to — compliance is no longer optional.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-sp-800-218-ssdf-final-publication</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-sp-800-218-ssdf-final-publication</guid>
      <pubDate>Thu, 05 May 2022 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[CI/CD Pipeline Audit Logging: What to Capture and Why]]></title>
      <description><![CDATA[Your CI/CD pipeline is a high-value target. Without proper audit logging, you will not know when it has been compromised until it is too late.]]></description>
      <link>https://safeguard.sh/resources/blog/cicd-pipeline-audit-logging</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cicd-pipeline-audit-logging</guid>
      <pubDate>Thu, 28 Apr 2022 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[OpenSSF Alpha-Omega Project: Securing Open Source at Scale]]></title>
      <description><![CDATA[The Alpha-Omega Project, backed by $5M from Google and Microsoft, aims to improve security of the most critical open source projects. Here's what it means for the ecosystem.]]></description>
      <link>https://safeguard.sh/resources/blog/openssf-alpha-omega-project-securing-open-source</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/openssf-alpha-omega-project-securing-open-source</guid>
      <pubDate>Thu, 28 Apr 2022 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Ephemeral Environments for Security Testing: A Modern Approach]]></title>
      <description><![CDATA[Ephemeral environments — short-lived, on-demand copies of your application stack — are transforming how teams approach security testing. No more fighting over shared staging environments.]]></description>
      <link>https://safeguard.sh/resources/blog/ephemeral-environments-security-testing</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ephemeral-environments-security-testing</guid>
      <pubDate>Mon, 25 Apr 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[npm Supply Chain Attacks: 2022 Q1 Report]]></title>
      <description><![CDATA[The first quarter of 2022 saw a surge in npm malware — from protestware to dependency confusion to credential-stealing packages. Here's a roundup of the most significant incidents and emerging trends.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-supply-chain-attacks-2022-q1-report</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-supply-chain-attacks-2022-q1-report</guid>
      <pubDate>Wed, 20 Apr 2022 11:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Costa Rica Conti Ransomware: The First Ransomware Attack to Trigger a National Emergency]]></title>
      <description><![CDATA[The Conti ransomware group attacked Costa Rica's government systems so severely that the president declared a national emergency — the first time a country took such action in response to a cyberattack.]]></description>
      <link>https://safeguard.sh/resources/blog/costa-rica-conti-ransomware-national</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/costa-rica-conti-ransomware-national</guid>
      <pubDate>Mon, 18 Apr 2022 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Beanstalk Farms Governance Attack: $182 Million Stolen Through a Democratic Vote]]></title>
      <description><![CDATA[Attackers used a flash loan to temporarily gain majority voting power in Beanstalk Farms' governance system, then voted to transfer $182 million to themselves — all within a single blockchain transaction.]]></description>
      <link>https://safeguard.sh/resources/blog/beanstalk-defi-governance-attack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/beanstalk-defi-governance-attack</guid>
      <pubDate>Sun, 17 Apr 2022 10:00:00 GMT</pubDate>
      <category>DeFi Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[GitHub OAuth Token Theft: The Heroku and Travis CI Breach]]></title>
      <description><![CDATA[Attackers stole OAuth tokens from Heroku and Travis CI to access private GitHub repositories across dozens of organizations, including npm itself. The full scope of the breach took weeks to unravel.]]></description>
      <link>https://safeguard.sh/resources/blog/github-oauth-token-theft-heroku-travis-ci</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-oauth-token-theft-heroku-travis-ci</guid>
      <pubDate>Fri, 15 Apr 2022 14:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Temp File Race Conditions in Build Systems: The TOCTOU Problem]]></title>
      <description><![CDATA[Build systems create and process temporary files constantly. Race conditions in temp file handling can be exploited to inject malicious content into builds.]]></description>
      <link>https://safeguard.sh/resources/blog/temp-file-race-conditions-build-systems</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/temp-file-race-conditions-build-systems</guid>
      <pubDate>Fri, 15 Apr 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Azure DevOps Supply Chain Risks: Securing Your Microsoft CI/CD Pipeline]]></title>
      <description><![CDATA[Azure DevOps pipelines present unique supply chain risks from marketplace extensions to service connections. A breakdown of the attack surface and how to harden it.]]></description>
      <link>https://safeguard.sh/resources/blog/azure-devops-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/azure-devops-supply-chain-risks</guid>
      <pubDate>Fri, 15 Apr 2022 08:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Container Registry Hardening: The 2022 Baseline]]></title>
      <description><![CDATA[Your container registry is a signing oracle, a software distribution system, and a typosquat target rolled into one. Here is the hardening baseline for 2022.]]></description>
      <link>https://safeguard.sh/resources/blog/container-registry-hardening-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-registry-hardening-2022</guid>
      <pubDate>Fri, 08 Apr 2022 12:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[LAPSUS$ Group: Unconventional Attack Techniques That Embarrassed Big Tech]]></title>
      <description><![CDATA[LAPSUS$ broke into Microsoft, Nvidia, Samsung, and Okta using social engineering and insider recruitment rather than sophisticated malware. Their techniques exposed fundamental security gaps.]]></description>
      <link>https://safeguard.sh/resources/blog/lapsus-group-attack-techniques-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/lapsus-group-attack-techniques-analysis</guid>
      <pubDate>Fri, 08 Apr 2022 10:00:00 GMT</pubDate>
      <category>Threat Actors</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Automation in CI/CD Pipelines: A Hands-On Guide]]></title>
      <description><![CDATA[Generating SBOMs manually is unsustainable. Here's how to automate SBOM creation, validation, and distribution as part of your existing CI/CD pipeline with practical examples.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-automation-in-ci-cd-pipelines</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-automation-in-ci-cd-pipelines</guid>
      <pubDate>Fri, 08 Apr 2022 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Generating SBOMs with Syft: The Complete Guide]]></title>
      <description><![CDATA[Syft is the most popular open-source SBOM generator. Here's how to use it effectively for containers, directories, archives, and CI/CD pipelines.]]></description>
      <link>https://safeguard.sh/resources/blog/generating-sbom-with-syft-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/generating-sbom-with-syft-guide</guid>
      <pubDate>Fri, 08 Apr 2022 00:00:00 GMT</pubDate>
      <category>SBOM</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[VMware Workspace ONE CVE-2022-22954: Server-Side Template Injection Goes Enterprise]]></title>
      <description><![CDATA[CVE-2022-22954 in VMware Workspace ONE Access allowed unauthenticated RCE via server-side template injection. Attackers used it to deploy cryptominers and backdoors.]]></description>
      <link>https://safeguard.sh/resources/blog/vmware-workspace-one-cve-2022-22954</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vmware-workspace-one-cve-2022-22954</guid>
      <pubDate>Wed, 06 Apr 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Fuzz Testing Supply Chain Components: Finding Bugs Before Attackers Do]]></title>
      <description><![CDATA[Fuzz testing discovers crashes, memory corruption, and logic errors by feeding random inputs to software. Applied to supply chain components, it reveals vulnerabilities that code review and static analysis miss.]]></description>
      <link>https://safeguard.sh/resources/blog/fuzz-testing-supply-chain-components</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/fuzz-testing-supply-chain-components</guid>
      <pubDate>Tue, 05 Apr 2022 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Mailchimp Social Engineering Breach: How an Employee Hack Compromised Crypto Customers]]></title>
      <description><![CDATA[A social engineering attack on Mailchimp employees gave attackers access to internal tools, which they used to target cryptocurrency companies and their customers in a downstream phishing campaign.]]></description>
      <link>https://safeguard.sh/resources/blog/mailchimp-social-engineering-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/mailchimp-social-engineering-breach</guid>
      <pubDate>Mon, 04 Apr 2022 10:00:00 GMT</pubDate>
      <category>Social Engineering</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Spring4Shell (CVE-2022-22965) Response Analysis]]></title>
      <description><![CDATA[A 2010-era bypass resurfaced as CVE-2022-22965 on Spring Framework for JDK 9+. Here is how the disclosure, patch, and industry response actually went.]]></description>
      <link>https://safeguard.sh/resources/blog/spring4shell-cve-2022-22965-response-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spring4shell-cve-2022-22965-response-analysis</guid>
      <pubDate>Sat, 02 Apr 2022 12:00:00 GMT</pubDate>
      <category>Vulnerability Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Spring4Shell vs Log4Shell: Comparing Two Java Framework Crises]]></title>
      <description><![CDATA[Both scored 9.8 on CVSS. Both affected millions of Java applications. But Log4Shell and Spring4Shell had fundamentally different blast radii. Here's a direct comparison.]]></description>
      <link>https://safeguard.sh/resources/blog/spring4shell-vs-log4shell-comparison</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spring4shell-vs-log4shell-comparison</guid>
      <pubDate>Sat, 02 Apr 2022 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Spring4Shell (CVE-2022-22965): Remote Code Execution in Spring Framework]]></title>
      <description><![CDATA[A critical RCE in Spring Framework sent Java teams scrambling. While less catastrophic than Log4Shell, Spring4Shell exposed dangerous assumptions about ClassLoader access in Java web applications.]]></description>
      <link>https://safeguard.sh/resources/blog/spring4shell-cve-2022-22965-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/spring4shell-cve-2022-22965-analysis</guid>
      <pubDate>Thu, 31 Mar 2022 08:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Ronin Network Hack: $625 Million Stolen from Axie Infinity's Blockchain Bridge]]></title>
      <description><![CDATA[North Korean hackers stole $625 million from the Ronin Network bridge powering Axie Infinity, exploiting compromised validator keys in what became the largest DeFi hack in history at the time.]]></description>
      <link>https://safeguard.sh/resources/blog/ronin-network-hack-625-million</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ronin-network-hack-625-million</guid>
      <pubDate>Tue, 29 Mar 2022 10:00:00 GMT</pubDate>
      <category>Cryptocurrency Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Microsoft LAPSUS$ Breach: Source Code Access and the Limits of Perimeter Security]]></title>
      <description><![CDATA[LAPSUS$ claimed access to Microsoft's source code repositories, leaking 37GB of code from Bing, Cortana, and other projects. The breach showed that even tech giants have access control gaps.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-lapsus-breach-source-code-access</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-lapsus-breach-source-code-access</guid>
      <pubDate>Tue, 22 Mar 2022 15:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Disclosure Programs: Building Trust with Security Researchers]]></title>
      <description><![CDATA[A well-designed vulnerability disclosure program turns external researchers into force multipliers for your security team. A poorly-designed one guarantees your vulnerabilities end up on Twitter instead of your inbox.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-disclosure-programs-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-disclosure-programs-best-practices</guid>
      <pubDate>Tue, 22 Mar 2022 11:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Okta LAPSUS$ Breach: When Your Identity Provider Gets Compromised]]></title>
      <description><![CDATA[LAPSUS$ breached an Okta support contractor, gaining access to customer tenants. The incident raised critical questions about identity provider supply chain risk.]]></description>
      <link>https://safeguard.sh/resources/blog/okta-lapsus-breach-january-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/okta-lapsus-breach-january-2022</guid>
      <pubDate>Tue, 22 Mar 2022 09:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[A First-Principles Guide to Artifact Signing in 2022]]></title>
      <description><![CDATA[Artifact signing is having a moment, but most teams skip the fundamentals. Here is the first-principles case for why you sign, what you sign, and who verifies.]]></description>
      <link>https://safeguard.sh/resources/blog/first-principles-artifact-signing-guide-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/first-principles-artifact-signing-guide-2022</guid>
      <pubDate>Sun, 20 Mar 2022 12:00:00 GMT</pubDate>
      <category>Best Practices</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Kubernetes Supply Chain Security: Best Practices for 2022]]></title>
      <description><![CDATA[Kubernetes does not run your code — it runs container images built from layers of dependencies you may not control. Securing the K8s supply chain requires thinking beyond pod security policies.]]></description>
      <link>https://safeguard.sh/resources/blog/kubernetes-supply-chain-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kubernetes-supply-chain-security-best-practices</guid>
      <pubDate>Tue, 15 Mar 2022 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Certificate Authority Compromise and Supply Chain Risks]]></title>
      <description><![CDATA[A compromised certificate authority can undermine TLS trust for your entire software supply chain. Understanding CA risks is essential for defending package integrity and secure distribution.]]></description>
      <link>https://safeguard.sh/resources/blog/certificate-authority-compromise-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/certificate-authority-compromise-risks</guid>
      <pubDate>Sat, 12 Mar 2022 00:00:00 GMT</pubDate>
      <category>PKI Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Dirty Pipe (CVE-2022-0847): A Deep Dive into the Linux Kernel Vulnerability]]></title>
      <description><![CDATA[Dirty Pipe allowed any local user to overwrite data in read-only files, including SUID binaries, leading to trivial root escalation. The bug was elegant, dangerous, and surprisingly recent.]]></description>
      <link>https://safeguard.sh/resources/blog/dirty-pipe-cve-2022-0847-linux-kernel-vulnerability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dirty-pipe-cve-2022-0847-linux-kernel-vulnerability</guid>
      <pubDate>Mon, 07 Mar 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Samsung LAPSUS$ Breach: 190GB of Source Code and the Cost of Insider Access]]></title>
      <description><![CDATA[The LAPSUS$ group stole 190GB of Samsung source code including biometric authentication algorithms and bootloader code. The breach exposed critical device security internals.]]></description>
      <link>https://safeguard.sh/resources/blog/samsung-lapsus-breach-source-code-theft</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/samsung-lapsus-breach-source-code-theft</guid>
      <pubDate>Mon, 07 Mar 2022 10:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Conti Ransomware Leaks: What the Internal Files Revealed About Supply Chain Tools]]></title>
      <description><![CDATA[When Conti's internal communications leaked in early 2022, they exposed the operational playbook of a top-tier ransomware gang — including how they targeted supply chains.]]></description>
      <link>https://safeguard.sh/resources/blog/conti-ransomware-leaks-supply-chain-tools</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/conti-ransomware-leaks-supply-chain-tools</guid>
      <pubDate>Wed, 02 Mar 2022 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[NVIDIA LAPSUS$ Breach: Stolen Code Signing Certificates Used to Sign Malware]]></title>
      <description><![CDATA[When LAPSUS$ breached NVIDIA, they stole code signing certificates that were immediately weaponized to sign malware. The incident demonstrated how trust mechanisms become attack vectors.]]></description>
      <link>https://safeguard.sh/resources/blog/nvidia-lapsus-breach-code-signing-certificates</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nvidia-lapsus-breach-code-signing-certificates</guid>
      <pubDate>Tue, 01 Mar 2022 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Heroku and GitHub OAuth Token Theft: The Early Warning Signs]]></title>
      <description><![CDATA[Stolen OAuth tokens from Heroku's integration with GitHub gave attackers access to private repositories across dozens of organizations. The breach revealed systemic weaknesses in third-party OAuth integrations.]]></description>
      <link>https://safeguard.sh/resources/blog/heroku-github-oauth-token-theft</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/heroku-github-oauth-token-theft</guid>
      <pubDate>Fri, 25 Feb 2022 12:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[SolarWinds Lessons Two Years On: What Actually Changed]]></title>
      <description><![CDATA[Two years after the SolarWinds SUNBURST compromise, the industry has new frameworks and new vocabulary — but has the build pipeline actually gotten harder to attack?]]></description>
      <link>https://safeguard.sh/resources/blog/solarwinds-lessons-two-years-on</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/solarwinds-lessons-two-years-on</guid>
      <pubDate>Fri, 18 Feb 2022 12:00:00 GMT</pubDate>
      <category>Industry Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Event-Driven Architecture Security: Risks You Cannot Ignore]]></title>
      <description><![CDATA[Event-driven systems decouple producers from consumers, but that decoupling creates security blind spots. Here is how to secure the invisible connections.]]></description>
      <link>https://safeguard.sh/resources/blog/event-driven-architecture-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/event-driven-architecture-security</guid>
      <pubDate>Fri, 18 Feb 2022 10:00:00 GMT</pubDate>
      <category>Architecture Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Security for Startups: A Practical Guide]]></title>
      <description><![CDATA[You don't need a massive security team to get supply chain security right. Here's a pragmatic, prioritized approach for startups that balances risk reduction with engineering velocity.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-security-for-startups</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-security-for-startups</guid>
      <pubDate>Tue, 15 Feb 2022 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Open Source License Compliance: A Practical Guide for 2022]]></title>
      <description><![CDATA[License compliance is not just a legal checkbox — it is a business risk. Misunderstanding copyleft obligations or violating attribution requirements can result in lawsuits, forced code disclosure, or product recalls.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-license-compliance-guide-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-license-compliance-guide-2022</guid>
      <pubDate>Thu, 10 Feb 2022 08:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[SAP ICM CVE-2022-22536: ICMAD Vulnerabilities Hit the Heart of Enterprise Software]]></title>
      <description><![CDATA[CVE-2022-22536 scored a perfect CVSS 10.0, allowing unauthenticated request smuggling in SAP's Internet Communication Manager. Tens of thousands of SAP systems were at risk.]]></description>
      <link>https://safeguard.sh/resources/blog/sap-icmad-cve-2022-22536-critical</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sap-icmad-cve-2022-22536-critical</guid>
      <pubDate>Tue, 08 Feb 2022 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SBOM Formats Compared: CycloneDX vs SPDX in 2022]]></title>
      <description><![CDATA[Two SBOM standards are competing for adoption. CycloneDX and SPDX take fundamentally different approaches to describing software components. Here's what matters when choosing between them.]]></description>
      <link>https://safeguard.sh/resources/blog/sbom-formats-compared-cyclonedx-vs-spdx</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sbom-formats-compared-cyclonedx-vs-spdx</guid>
      <pubDate>Sat, 05 Feb 2022 10:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Firmware Supply Chain Security Guide]]></title>
      <description><![CDATA[Firmware runs below the operating system, making it invisible to most security tools. Compromised firmware can persist through OS reinstallation, making supply chain integrity essential.]]></description>
      <link>https://safeguard.sh/resources/blog/firmware-supply-chain-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/firmware-supply-chain-security-guide</guid>
      <pubDate>Sat, 05 Feb 2022 00:00:00 GMT</pubDate>
      <category>Hardware Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[News Corp Breach: Chinese Espionage Targeted Journalists for Two Years]]></title>
      <description><![CDATA[A China-linked espionage operation infiltrated News Corp's systems for nearly two years, targeting journalists covering topics sensitive to Beijing — a stark example of state-sponsored cyber espionage against the press.]]></description>
      <link>https://safeguard.sh/resources/blog/news-corp-china-espionage-breach</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/news-corp-china-espionage-breach</guid>
      <pubDate>Fri, 04 Feb 2022 10:00:00 GMT</pubDate>
      <category>Nation-State Threats</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Polkit pkexec Privilege Escalation: CVE-2021-4034 (PwnKit)]]></title>
      <description><![CDATA[A 12-year-old memory corruption bug in Polkit's pkexec gave any unprivileged local user instant root access on virtually every major Linux distribution. Here's why it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/polkit-pkexec-cve-2022-0847-dirty-pipe</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/polkit-pkexec-cve-2022-0847-dirty-pipe</guid>
      <pubDate>Fri, 28 Jan 2022 14:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Rust Crate Supply Chain Security: Lessons from a Growing Ecosystem]]></title>
      <description><![CDATA[As Rust adoption accelerates, its crate ecosystem faces the same supply chain threats that plague npm and PyPI. Here's what the Rust community is doing right — and where gaps remain.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-crate-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-crate-supply-chain-security</guid>
      <pubDate>Thu, 20 Jan 2022 11:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Red Cross Data Breach: Attackers Targeted the World's Most Vulnerable People]]></title>
      <description><![CDATA[A sophisticated cyberattack on the International Committee of the Red Cross compromised personal data of over 515,000 highly vulnerable people, including victims of conflict, missing persons, and detained individuals.]]></description>
      <link>https://safeguard.sh/resources/blog/red-cross-data-breach-2022</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/red-cross-data-breach-2022</guid>
      <pubDate>Thu, 20 Jan 2022 10:00:00 GMT</pubDate>
      <category>Data Breach</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Log4j and the Maintainer Burnout Crisis Nobody Talks About]]></title>
      <description><![CDATA[The Log4Shell vulnerability exposed more than a critical flaw in Java logging. It revealed a systemic failure in how the industry treats the people who maintain critical open source infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/log4j-maintainer-burnout-lessons</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/log4j-maintainer-burnout-lessons</guid>
      <pubDate>Tue, 18 Jan 2022 00:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Crypto.com Hack: $34 Million Stolen by Bypassing Two-Factor Authentication]]></title>
      <description><![CDATA[Attackers bypassed Crypto.com's two-factor authentication system to drain approximately $34 million from 483 user accounts, raising serious questions about the security of centralized crypto exchanges.]]></description>
      <link>https://safeguard.sh/resources/blog/crypto-com-hack-34-million</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/crypto-com-hack-34-million</guid>
      <pubDate>Mon, 17 Jan 2022 10:00:00 GMT</pubDate>
      <category>Cryptocurrency Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[TypeScript Strict Mode Security Benefits: More Than Just Type Safety]]></title>
      <description><![CDATA[TypeScript's strict mode catches entire categories of bugs at compile time. Some of those bugs have direct security implications.]]></description>
      <link>https://safeguard.sh/resources/blog/typescript-strict-mode-security-benefits</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/typescript-strict-mode-security-benefits</guid>
      <pubDate>Wed, 12 Jan 2022 10:00:00 GMT</pubDate>
      <category>Secure Development</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[colors.js and faker.js: When Maintainer Burnout Becomes a Supply Chain Crisis]]></title>
      <description><![CDATA[Marak Squires deliberately broke two of npm's most popular packages to protest the exploitation of open source maintainers. The fallout exposed how fragile our dependency chains really are.]]></description>
      <link>https://safeguard.sh/resources/blog/colors-js-faker-js-open-source-maintainer-burnout</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/colors-js-faker-js-open-source-maintainer-burnout</guid>
      <pubDate>Mon, 10 Jan 2022 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[node-ipc Protestware: When a Maintainer Weaponized the Supply Chain]]></title>
      <description><![CDATA[The node-ipc package was deliberately sabotaged by its maintainer to protest the Russia-Ukraine conflict, wiping files on systems with Russian or Belarusian IP addresses. A watershed moment for supply chain trust.]]></description>
      <link>https://safeguard.sh/resources/blog/node-ipc-protestware-peacenotwar-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/node-ipc-protestware-peacenotwar-supply-chain</guid>
      <pubDate>Sat, 08 Jan 2022 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Software Supply Chain Attacks 2021: A Complete Timeline]]></title>
      <description><![CDATA[2021 was the year software supply chain attacks went mainstream. From SolarWinds aftermath to Log4Shell, here's every major incident and what they tell us about the threat landscape.]]></description>
      <link>https://safeguard.sh/resources/blog/software-supply-chain-attacks-2021-timeline</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-supply-chain-attacks-2021-timeline</guid>
      <pubDate>Tue, 28 Dec 2021 09:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Container Image Vulnerabilities: 2021 Year in Review]]></title>
      <description><![CDATA[Container security matured significantly in 2021, but the vulnerability landscape in base images, registries, and runtime configurations remains concerning.]]></description>
      <link>https://safeguard.sh/resources/blog/container-image-vulnerabilities-2021-year-in-review</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/container-image-vulnerabilities-2021-year-in-review</guid>
      <pubDate>Wed, 22 Dec 2021 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[CISA Known Exploited Vulnerabilities Catalog Launched]]></title>
      <description><![CDATA[CISA's KEV catalog changes vulnerability management from theoretical risk to confirmed exploitation. Here's what it means and how to use it for prioritization.]]></description>
      <link>https://safeguard.sh/resources/blog/cisa-known-exploited-vulnerabilities-catalog-launched</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cisa-known-exploited-vulnerabilities-catalog-launched</guid>
      <pubDate>Mon, 20 Dec 2021 09:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Detecting Log4Shell in Your Software Supply Chain]]></title>
      <description><![CDATA[Log4j isn't just in your code — it's in your vendors' code, your container base images, and your transitive dependencies. Here's how to find it everywhere.]]></description>
      <link>https://safeguard.sh/resources/blog/detecting-log4shell-in-your-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/detecting-log4shell-in-your-software-supply-chain</guid>
      <pubDate>Sat, 18 Dec 2021 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Log4Shell Impact Assessment and Remediation Guide]]></title>
      <description><![CDATA[You know Log4Shell is bad. Now here's how to find every instance in your environment and fix it — including the edge cases everyone misses.]]></description>
      <link>https://safeguard.sh/resources/blog/log4shell-impact-assessment-and-remediation-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/log4shell-impact-assessment-and-remediation-guide</guid>
      <pubDate>Wed, 15 Dec 2021 08:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Kronos Ransomware Attack: When Payroll Systems Go Dark Before the Holidays]]></title>
      <description><![CDATA[A ransomware attack on Ultimate Kronos Group disrupted payroll and workforce management for millions of workers at hospitals, governments, and major employers right before the holiday season.]]></description>
      <link>https://safeguard.sh/resources/blog/kronos-ransomware-attack-payroll</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kronos-ransomware-attack-payroll</guid>
      <pubDate>Tue, 14 Dec 2021 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Log4Shell Vulnerability (CVE-2021-44228) Explained]]></title>
      <description><![CDATA[The most critical vulnerability in a decade dropped on a Friday. Log4Shell affects virtually every Java application and is trivial to exploit. Here's what happened.]]></description>
      <link>https://safeguard.sh/resources/blog/log4shell-vulnerability-cve-2021-44228-explained</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/log4shell-vulnerability-cve-2021-44228-explained</guid>
      <pubDate>Mon, 13 Dec 2021 08:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Grafana CVE-2021-43798: Directory Traversal in Everyone's Favorite Dashboard Tool]]></title>
      <description><![CDATA[CVE-2021-43798 allowed unauthenticated directory traversal in Grafana, exposing configuration files and credentials. Exploitation was trivial and widespread.]]></description>
      <link>https://safeguard.sh/resources/blog/grafana-cve-2021-43798-directory-traversal</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/grafana-cve-2021-43798-directory-traversal</guid>
      <pubDate>Sun, 05 Dec 2021 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[gRPC Security Considerations for Microservice Architectures]]></title>
      <description><![CDATA[gRPC powers high-performance microservice communication, but its binary protocol and code generation model introduce unique security challenges most teams overlook.]]></description>
      <link>https://safeguard.sh/resources/blog/grpc-security-considerations</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/grpc-security-considerations</guid>
      <pubDate>Sun, 05 Dec 2021 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Vendor Concentration Risk: When Your Entire Stack Depends on One Company]]></title>
      <description><![CDATA[Relying too heavily on a single vendor creates systemic risk that most organizations dramatically underestimate. Here is how to measure and manage it.]]></description>
      <link>https://safeguard.sh/resources/blog/vendor-concentration-risk-software-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vendor-concentration-risk-software-supply-chain</guid>
      <pubDate>Sun, 05 Dec 2021 10:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Zero-Day Vulnerabilities in Open Source: 2021 in Review]]></title>
      <description><![CDATA[2021 saw a record number of zero-day exploits targeting open-source software. From Log4Shell to ProxyShell, here's what happened and what it means for defenders.]]></description>
      <link>https://safeguard.sh/resources/blog/zero-day-vulnerabilities-in-open-source-2021</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zero-day-vulnerabilities-in-open-source-2021</guid>
      <pubDate>Sun, 28 Nov 2021 09:00:00 GMT</pubDate>
      <category>Vulnerability Research</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[BGP Hijacking and Software Distribution Security]]></title>
      <description><![CDATA[BGP hijacking lets attackers reroute internet traffic at the network level, silently intercepting software downloads and updates. This is one of the most powerful yet overlooked supply chain attack vectors.]]></description>
      <link>https://safeguard.sh/resources/blog/bgp-hijacking-software-distribution</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/bgp-hijacking-software-distribution</guid>
      <pubDate>Sun, 28 Nov 2021 00:00:00 GMT</pubDate>
      <category>Network Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Panasonic Data Breach: Four Months of Undetected Network Access]]></title>
      <description><![CDATA[Panasonic disclosed a data breach in November 2021, revealing that attackers had maintained access to its network for over four months before detection — highlighting the persistent challenge of dwell time.]]></description>
      <link>https://safeguard.sh/resources/blog/panasonic-data-breach-november-2021</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/panasonic-data-breach-november-2021</guid>
      <pubDate>Fri, 26 Nov 2021 10:00:00 GMT</pubDate>
      <category>Data Breach</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Zoho ManageEngine CVE-2021-44077: When IT Management Tools Get Owned]]></title>
      <description><![CDATA[APT actors exploited CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus to breach critical infrastructure. An unauthenticated RCE in the software that manages your IT.]]></description>
      <link>https://safeguard.sh/resources/blog/zoho-managengine-cve-2021-44077-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/zoho-managengine-cve-2021-44077-exploitation</guid>
      <pubDate>Sat, 20 Nov 2021 10:00:00 GMT</pubDate>
      <category>Zero-Day Exploits</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Software Composition Analysis: The 2021 Buyer's Guide]]></title>
      <description><![CDATA[SCA tools have exploded in number and capability. Here's how to evaluate them without getting lost in vendor marketing.]]></description>
      <link>https://safeguard.sh/resources/blog/software-composition-analysis-sca-buyers-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-composition-analysis-sca-buyers-guide</guid>
      <pubDate>Sat, 20 Nov 2021 09:00:00 GMT</pubDate>
      <category>Tools & Techniques</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[XcodeGhost Revisited: How a Trojanized IDE Infected Thousands of iOS Apps]]></title>
      <description><![CDATA[XcodeGhost compromised Apple's developer toolchain by distributing a modified Xcode IDE. Years later, the attack remains a textbook example of build-tool supply chain compromise.]]></description>
      <link>https://safeguard.sh/resources/blog/apple-macos-supply-chain-xcode-ghost</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apple-macos-supply-chain-xcode-ghost</guid>
      <pubDate>Mon, 15 Nov 2021 10:00:00 GMT</pubDate>
      <category>Supply Chain Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Robinhood Data Breach: Social Engineering Strikes the Trading Platform]]></title>
      <description><![CDATA[A social engineering attack on a Robinhood customer support employee exposed personal data of approximately 7 million users, revealing the persistent vulnerability of human-facing systems.]]></description>
      <link>https://safeguard.sh/resources/blog/robinhood-data-breach-2021</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/robinhood-data-breach-2021</guid>
      <pubDate>Wed, 10 Nov 2021 10:00:00 GMT</pubDate>
      <category>Data Breach</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NTIA SBOM Minimum Elements: What Your SBOM Actually Needs to Contain]]></title>
      <description><![CDATA[The NTIA published its minimum elements for SBOMs in July 2021. Here's a practical breakdown of what's required, what's optional, and where most organizations fall short.]]></description>
      <link>https://safeguard.sh/resources/blog/ntia-sbom-minimum-elements-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ntia-sbom-minimum-elements-guide</guid>
      <pubDate>Wed, 10 Nov 2021 09:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Vulnerability Prioritization: Beyond CVSS Scores]]></title>
      <description><![CDATA[CVSS scores alone lead to alert fatigue and misallocated resources. Here's how EPSS, reachability analysis, and exploit intelligence create a smarter prioritization model.]]></description>
      <link>https://safeguard.sh/resources/blog/vulnerability-prioritization-beyond-cvss-scores</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/vulnerability-prioritization-beyond-cvss-scores</guid>
      <pubDate>Mon, 01 Nov 2021 09:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Cream Finance DeFi Hack: $130 Million Stolen Through Flash Loan Exploit]]></title>
      <description><![CDATA[Cream Finance suffered its third exploit in 2021, losing $130 million through a sophisticated flash loan attack that exposed fundamental vulnerabilities in DeFi lending protocols.]]></description>
      <link>https://safeguard.sh/resources/blog/cream-finance-defi-hack-130-million</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/cream-finance-defi-hack-130-million</guid>
      <pubDate>Thu, 28 Oct 2021 10:00:00 GMT</pubDate>
      <category>DeFi Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[The ua-parser-js npm Hijack of October 2021]]></title>
      <description><![CDATA[An npm package with 8 million weekly downloads shipped a cryptominer and credential stealer for four hours. Here is the exact sequence of events.]]></description>
      <link>https://safeguard.sh/resources/blog/ua-parser-js-npm-hijack-october-2021</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ua-parser-js-npm-hijack-october-2021</guid>
      <pubDate>Mon, 25 Oct 2021 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Sigstore and Cosign: Software Signing for the Rest of Us]]></title>
      <description><![CDATA[Sigstore makes software signing accessible by eliminating the pain of key management. Here's how Cosign, Fulcio, and Rekor work together to verify software integrity.]]></description>
      <link>https://safeguard.sh/resources/blog/sigstore-cosign-software-signing-explained</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sigstore-cosign-software-signing-explained</guid>
      <pubDate>Mon, 25 Oct 2021 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[REvil Ransomware Shutdown: How Law Enforcement Took Down a Ransomware Empire]]></title>
      <description><![CDATA[REvil was one of the most prolific ransomware-as-a-service operations until a coordinated law enforcement takedown dismantled its infrastructure in October 2021.]]></description>
      <link>https://safeguard.sh/resources/blog/revil-ransomware-shutdown-law-enforcement</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/revil-ransomware-shutdown-law-enforcement</guid>
      <pubDate>Fri, 22 Oct 2021 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Python PyPI Malware Campaigns in 2021]]></title>
      <description><![CDATA[Malicious packages on PyPI surged in 2021, targeting developers with credential stealers, backdoors, and data exfiltration. Here's what the campaigns look like and how to defend against them.]]></description>
      <link>https://safeguard.sh/resources/blog/python-pypi-malware-campaigns-2021</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/python-pypi-malware-campaigns-2021</guid>
      <pubDate>Fri, 15 Oct 2021 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Apache HTTP Server CVE-2021-41773: A Path Traversal Bug That Should Have Been Caught in Code Review]]></title>
      <description><![CDATA[CVE-2021-41773 allowed path traversal and RCE on Apache HTTP Server 2.4.49. The fix was incomplete, leading to CVE-2021-42013 days later. A lesson in patching under pressure.]]></description>
      <link>https://safeguard.sh/resources/blog/apache-http-server-cve-2021-41773-path-traversal</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apache-http-server-cve-2021-41773-path-traversal</guid>
      <pubDate>Tue, 12 Oct 2021 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Twitch Source Code Leak: What 125GB of Exposed Data Tells Us About Internal Security]]></title>
      <description><![CDATA[In October 2021, an anonymous hacker dumped Twitch's entire source code, internal tools, and creator payout data. The breach exposed systemic failures in access control and secret management.]]></description>
      <link>https://safeguard.sh/resources/blog/twitch-source-code-leak-october-2021</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/twitch-source-code-leak-october-2021</guid>
      <pubDate>Fri, 08 Oct 2021 14:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Docker Hub Malicious Images and Cryptomining Campaigns]]></title>
      <description><![CDATA[Researchers found that millions of Docker Hub pulls go to images containing cryptominers, backdoors, and other malware. Here's how to protect your container pipeline.]]></description>
      <link>https://safeguard.sh/resources/blog/docker-hub-malicious-images-cryptomining</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/docker-hub-malicious-images-cryptomining</guid>
      <pubDate>Tue, 05 Oct 2021 09:00:00 GMT</pubDate>
      <category>Container Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Binary Analysis for Supply Chain Verification]]></title>
      <description><![CDATA[When you can't audit source code, binary analysis becomes your last line of defense. Understanding how to verify compiled artifacts is critical for catching supply chain compromises.]]></description>
      <link>https://safeguard.sh/resources/blog/binary-analysis-supply-chain-verification</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/binary-analysis-supply-chain-verification</guid>
      <pubDate>Tue, 05 Oct 2021 00:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[GitHub Actions Security: Hidden Supply Chain Risks]]></title>
      <description><![CDATA[GitHub Actions workflows execute third-party code with access to your repository secrets. Most teams don't realize how much trust they're placing in action authors.]]></description>
      <link>https://safeguard.sh/resources/blog/github-actions-security-supply-chain-risks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/github-actions-security-supply-chain-risks</guid>
      <pubDate>Sat, 25 Sep 2021 10:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Apple's iCloud CSAM Scanning Controversy: Privacy vs. Security at Scale]]></title>
      <description><![CDATA[Apple's 2021 announcement of on-device CSAM scanning ignited a fierce debate about surveillance, encryption, and the boundaries of technology companies' responsibility — leading Apple to ultimately abandon the plan.]]></description>
      <link>https://safeguard.sh/resources/blog/apple-icloud-csam-privacy-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/apple-icloud-csam-privacy-security</guid>
      <pubDate>Wed, 22 Sep 2021 10:00:00 GMT</pubDate>
      <category>Privacy & Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Travis CI Token Leak Retrospective]]></title>
      <description><![CDATA[Travis CI exposed secrets from public repo forks for weeks in 2021. Here is the exact defect, who was affected, and the permanent takeaways.]]></description>
      <link>https://safeguard.sh/resources/blog/travis-ci-token-leak-retrospective-2021</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/travis-ci-token-leak-retrospective-2021</guid>
      <pubDate>Mon, 20 Sep 2021 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[npm colors and faker Sabotage: When Maintainers Revolt]]></title>
      <description><![CDATA[The maintainer of colors and faker deliberately corrupted his own packages, affecting thousands of projects. It raised uncomfortable questions about open source sustainability and trust.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-colors-faker-sabotage-open-source-trust</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-colors-faker-sabotage-open-source-trust</guid>
      <pubDate>Wed, 15 Sep 2021 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Business Impact Analysis for Software Dependency Failures]]></title>
      <description><![CDATA[Most BIAs ignore software dependencies entirely. Here is how to quantify the real business impact when a critical library or service goes down.]]></description>
      <link>https://safeguard.sh/resources/blog/business-impact-analysis-dependency-failures</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/business-impact-analysis-dependency-failures</guid>
      <pubDate>Fri, 10 Sep 2021 10:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[GraphQL API Security Best Practices]]></title>
      <description><![CDATA[GraphQL gives clients extraordinary power over queries. That flexibility is also its biggest security risk. Here is how to lock it down without killing usability.]]></description>
      <link>https://safeguard.sh/resources/blog/graphql-api-security-best-practices</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/graphql-api-security-best-practices</guid>
      <pubDate>Fri, 10 Sep 2021 10:00:00 GMT</pubDate>
      <category>API Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[ChaosDB: The Microsoft Azure Cosmos DB Vulnerability That Exposed Thousands of Databases]]></title>
      <description><![CDATA[A critical vulnerability in Azure Cosmos DB allowed any user to gain full admin access to other customers' database instances, exposing data from thousands of organizations including Fortune 500 companies.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-cosmosdb-chaosdb-vulnerability</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-cosmosdb-chaosdb-vulnerability</guid>
      <pubDate>Fri, 10 Sep 2021 10:00:00 GMT</pubDate>
      <category>Cloud Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Third-Party Risk Management for Software Vendors: Beyond the Questionnaire]]></title>
      <description><![CDATA[Security questionnaires are still how most organizations evaluate vendor risk. They're also still mostly useless. Here's what actually works.]]></description>
      <link>https://safeguard.sh/resources/blog/third-party-risk-management-software-vendors</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/third-party-risk-management-software-vendors</guid>
      <pubDate>Wed, 08 Sep 2021 09:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Pegasus Spyware and NSO Group: The Supply Chain of Surveillance]]></title>
      <description><![CDATA[The Pegasus Project revealed NSO Group's spyware targeting journalists, activists, and politicians through zero-click exploits. This is what a weaponized supply chain looks like.]]></description>
      <link>https://safeguard.sh/resources/blog/pegasus-spyware-nso-group-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pegasus-spyware-nso-group-supply-chain</guid>
      <pubDate>Sun, 05 Sep 2021 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[SLSA Framework Introduction: Securing Supply Chain Integrity]]></title>
      <description><![CDATA[Google's SLSA framework provides a graduated model for supply chain integrity, from basic provenance to fully verified builds. Here's how it works and why it matters.]]></description>
      <link>https://safeguard.sh/resources/blog/slsa-framework-introduction-supply-chain-integrity</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/slsa-framework-introduction-supply-chain-integrity</guid>
      <pubDate>Wed, 01 Sep 2021 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[DevSecOps Maturity Model: Where Does Your Organization Stand?]]></title>
      <description><![CDATA[Most teams claim they've adopted DevSecOps. Few have actually matured beyond running a scanner in CI. Here's a practical maturity model to figure out where you really are.]]></description>
      <link>https://safeguard.sh/resources/blog/devsecops-maturity-model-where-do-you-stand</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/devsecops-maturity-model-where-do-you-stand</guid>
      <pubDate>Sat, 28 Aug 2021 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Regular Expression Denial of Service (ReDoS): When Patterns Attack]]></title>
      <description><![CDATA[A single poorly written regex can take down your server. ReDoS is a subtle denial-of-service vulnerability hiding in dependencies you have never audited.]]></description>
      <link>https://safeguard.sh/resources/blog/redos-regular-expression-denial-of-service</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/redos-regular-expression-denial-of-service</guid>
      <pubDate>Fri, 20 Aug 2021 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Securing CI/CD Pipelines from Supply Chain Attacks]]></title>
      <description><![CDATA[CI/CD pipelines are the new attack surface. From poisoned dependencies to compromised build tools, here's how to lock down your software delivery infrastructure.]]></description>
      <link>https://safeguard.sh/resources/blog/securing-ci-cd-pipelines-from-supply-chain-attacks</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/securing-ci-cd-pipelines-from-supply-chain-attacks</guid>
      <pubDate>Fri, 20 Aug 2021 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[Accenture LockBit Ransomware Attack: When a Security Consultant Gets Hacked]]></title>
      <description><![CDATA[LockBit ransomware operators breached Accenture, a major global consulting firm, claiming to have stolen 6TB of data and demanding a $50 million ransom.]]></description>
      <link>https://safeguard.sh/resources/blog/accenture-lockbit-ransomware-attack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/accenture-lockbit-ransomware-attack</guid>
      <pubDate>Wed, 18 Aug 2021 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[ProxyShell: The Microsoft Exchange Exploit Chain That Wouldn't Stop]]></title>
      <description><![CDATA[ProxyShell chained three Exchange vulnerabilities for unauthenticated remote code execution. Months after patches were available, thousands of servers remained exposed.]]></description>
      <link>https://safeguard.sh/resources/blog/proxyshell-microsoft-exchange-exploitation</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/proxyshell-microsoft-exchange-exploitation</guid>
      <pubDate>Thu, 12 Aug 2021 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Typosquatting Attacks on npm and PyPI Explained]]></title>
      <description><![CDATA[Attackers exploit human typos to distribute malware through package registries. Here's how typosquatting works, real examples, and how to protect your builds.]]></description>
      <link>https://safeguard.sh/resources/blog/typosquatting-attacks-npm-pypi-explained</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/typosquatting-attacks-npm-pypi-explained</guid>
      <pubDate>Tue, 10 Aug 2021 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[DNS Hijacking and Its Supply Chain Implications]]></title>
      <description><![CDATA[DNS hijacking can redirect software updates, package downloads, and API calls to attacker-controlled servers. Here's how this underrated attack vector threatens your entire software supply chain.]]></description>
      <link>https://safeguard.sh/resources/blog/dns-hijacking-supply-chain-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dns-hijacking-supply-chain-implications</guid>
      <pubDate>Thu, 05 Aug 2021 00:00:00 GMT</pubDate>
      <category>Network Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Open Source Security: State of the Union 2021]]></title>
      <description><![CDATA[Open source powers the modern internet, but its security model is under strain. Here's the 2021 landscape of open source risk, from funding to maintainer burnout to malicious packages.]]></description>
      <link>https://safeguard.sh/resources/blog/open-source-security-state-of-the-union-2021</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/open-source-security-state-of-the-union-2021</guid>
      <pubDate>Sun, 01 Aug 2021 09:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Why Software Bill of Materials Matter]]></title>
      <description><![CDATA[SBOMs are the foundation of software supply chain security. Without knowing what's in your software, you can't secure it. Here's why SBOMs matter and how to get started.]]></description>
      <link>https://safeguard.sh/resources/blog/why-software-bill-of-materials-matter</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/why-software-bill-of-materials-matter</guid>
      <pubDate>Sun, 25 Jul 2021 09:00:00 GMT</pubDate>
      <category>DevSecOps</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[LinkedIn Data Scraping: 700 Million User Records Sold on the Dark Web]]></title>
      <description><![CDATA[A threat actor scraped data from 700 million LinkedIn users — 93% of the platform's user base — and put it up for sale, reigniting the debate over API abuse and data privacy.]]></description>
      <link>https://safeguard.sh/resources/blog/linkedin-data-scraping-700-million</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/linkedin-data-scraping-700-million</guid>
      <pubDate>Tue, 20 Jul 2021 10:00:00 GMT</pubDate>
      <category>Data Breach</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[npm Package ua-parser-js Compromised: 8 Million Weekly Downloads Weaponized]]></title>
      <description><![CDATA[Attackers hijacked the ua-parser-js npm package account and published malicious versions containing cryptominers and password stealers. The package gets 8 million downloads per week.]]></description>
      <link>https://safeguard.sh/resources/blog/npm-package-ua-parser-js-compromised</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/npm-package-ua-parser-js-compromised</guid>
      <pubDate>Thu, 15 Jul 2021 10:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Kaseya VSA Ransomware: A Supply Chain Analysis]]></title>
      <description><![CDATA[REvil chained three zero-days in Kaseya VSA to push ransomware through 1,500 MSP customers on July 2, 2021. Here is the technical anatomy.]]></description>
      <link>https://safeguard.sh/resources/blog/kaseya-vsa-ransomware-supply-chain-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kaseya-vsa-ransomware-supply-chain-analysis</guid>
      <pubDate>Thu, 08 Jul 2021 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[PrintNightmare CVE-2021-34527: The Windows Print Spooler Bug That Haunted Every Enterprise]]></title>
      <description><![CDATA[PrintNightmare gave attackers SYSTEM-level access through the Windows Print Spooler service running on nearly every Windows machine. The patch rollout was a mess.]]></description>
      <link>https://safeguard.sh/resources/blog/printnightmare-cve-2021-34527-windows</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/printnightmare-cve-2021-34527-windows</guid>
      <pubDate>Thu, 08 Jul 2021 10:00:00 GMT</pubDate>
      <category>Vulnerability Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Kaseya VSA Ransomware: Supply Chain Attack Hits 1,500 Businesses]]></title>
      <description><![CDATA[REvil exploited Kaseya's VSA platform to push ransomware to managed service providers and their customers. Up to 1,500 businesses were hit in a single weekend.]]></description>
      <link>https://safeguard.sh/resources/blog/kaseya-vsa-ransomware-supply-chain-attack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/kaseya-vsa-ransomware-supply-chain-attack</guid>
      <pubDate>Mon, 05 Jul 2021 08:00:00 GMT</pubDate>
      <category>Incident Response</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Facebook Data Leak: 533 Million Users Exposed Through a Contact Import Feature]]></title>
      <description><![CDATA[Personal data from 533 million Facebook users across 106 countries was posted on a hacking forum, exposing phone numbers, emails, and personal details scraped through a contact import vulnerability.]]></description>
      <link>https://safeguard.sh/resources/blog/facebook-data-leak-533-million</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/facebook-data-leak-533-million</guid>
      <pubDate>Fri, 02 Jul 2021 10:00:00 GMT</pubDate>
      <category>Data Breach</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[MessagePack Security Implications: Binary Serialization Risks]]></title>
      <description><![CDATA[MessagePack is faster than JSON but shares some of JSON's security pitfalls while adding new ones. Here is what to watch for.]]></description>
      <link>https://safeguard.sh/resources/blog/messagepack-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/messagepack-security-implications</guid>
      <pubDate>Fri, 25 Jun 2021 10:00:00 GMT</pubDate>
      <category>Application Security</category>
      <author>hi@safeguard.sh (Michael)</author>
    </item>
    <item>
      <title><![CDATA[Disaster Recovery Planning for Software Supply Chain Incidents]]></title>
      <description><![CDATA[When a supply chain attack hits, your DR plan needs to cover more than just infrastructure failover. Here is how to prepare for the worst.]]></description>
      <link>https://safeguard.sh/resources/blog/disaster-recovery-software-supply-chain-incidents</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/disaster-recovery-software-supply-chain-incidents</guid>
      <pubDate>Tue, 22 Jun 2021 10:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Microsoft Exchange HAFNIUM Attack: Four Zero-Days That Compromised 30,000 Organizations]]></title>
      <description><![CDATA[Chinese state-sponsored group HAFNIUM exploited four zero-day vulnerabilities in Microsoft Exchange Server, compromising an estimated 30,000 US organizations and hundreds of thousands globally.]]></description>
      <link>https://safeguard.sh/resources/blog/microsoft-exchange-hafnium-attack</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/microsoft-exchange-hafnium-attack</guid>
      <pubDate>Sun, 20 Jun 2021 10:00:00 GMT</pubDate>
      <category>Zero-Day Exploits</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[NIST SSDF Framework: A Practical Guide]]></title>
      <description><![CDATA[The Secure Software Development Framework (SSDF) is becoming the baseline for federal software security. Here's what it contains and how to implement it.]]></description>
      <link>https://safeguard.sh/resources/blog/nist-ssdf-framework-practical-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/nist-ssdf-framework-practical-guide</guid>
      <pubDate>Fri, 18 Jun 2021 09:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Alex)</author>
    </item>
    <item>
      <title><![CDATA[Pulse Secure VPN Zero-Day CVE-2021-22893: When Your Security Gateway Becomes the Backdoor]]></title>
      <description><![CDATA[Chinese APT groups exploited CVE-2021-22893 in Pulse Secure VPN to breach defense contractors and government agencies. The irony of a security product being the entry point.]]></description>
      <link>https://safeguard.sh/resources/blog/pulse-secure-vpn-cve-2021-22893</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/pulse-secure-vpn-cve-2021-22893</guid>
      <pubDate>Tue, 15 Jun 2021 10:00:00 GMT</pubDate>
      <category>Zero-Day Exploits</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Dependency Confusion Attacks Explained]]></title>
      <description><![CDATA[Alex Birsan's research showed how internal package names can be exploited to inject malicious code into corporate build systems. Here's how the attack works and how to defend against it.]]></description>
      <link>https://safeguard.sh/resources/blog/dependency-confusion-attacks-explained</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/dependency-confusion-attacks-explained</guid>
      <pubDate>Thu, 10 Jun 2021 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Bob)</author>
    </item>
    <item>
      <title><![CDATA[JBS Foods Ransomware Attack: When Hackers Targeted the World's Meat Supply]]></title>
      <description><![CDATA[REvil ransomware shut down the world's largest meat processor, disrupting supply chains across the US, Australia, and Canada — and resulted in an $11 million ransom payment.]]></description>
      <link>https://safeguard.sh/resources/blog/jbs-foods-ransomware-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/jbs-foods-ransomware-supply-chain</guid>
      <pubDate>Sat, 05 Jun 2021 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Understanding SBOM Requirements Under EO 14028]]></title>
      <description><![CDATA[Executive Order 14028 mandates SBOMs for federal software procurement. Here's a practical breakdown of what's required, what formats to use, and how to get compliant.]]></description>
      <link>https://safeguard.sh/resources/blog/understanding-sbom-requirements-under-eo-14028</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/understanding-sbom-requirements-under-eo-14028</guid>
      <pubDate>Tue, 01 Jun 2021 09:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (James)</author>
    </item>
    <item>
      <title><![CDATA[Accellion FTA Breach: How a Legacy File Transfer Tool Became a Supply Chain Nightmare]]></title>
      <description><![CDATA[The Accellion FTA breach hit over 100 organizations through a 20-year-old file transfer appliance. Here's what went wrong and why legacy software is a ticking time bomb.]]></description>
      <link>https://safeguard.sh/resources/blog/accellion-fta-breach-supply-chain</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/accellion-fta-breach-supply-chain</guid>
      <pubDate>Tue, 25 May 2021 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Codecov Bash Uploader Compromise: A Supply Chain Attack on CI/CD]]></title>
      <description><![CDATA[Attackers modified Codecov's bash uploader script to steal environment variables from CI pipelines. Thousands of repositories were exposed for two months.]]></description>
      <link>https://safeguard.sh/resources/blog/codecov-bash-uploader-compromise</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/codecov-bash-uploader-compromise</guid>
      <pubDate>Thu, 20 May 2021 11:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[SolarWinds SUNBURST: Lessons for Supply Chain Security]]></title>
      <description><![CDATA[The SolarWinds attack compromised 18,000 organizations through a single tampered update. Six months later, here's what the industry should have learned.]]></description>
      <link>https://safeguard.sh/resources/blog/solarwinds-sunburst-lessons-for-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/solarwinds-sunburst-lessons-for-supply-chain-security</guid>
      <pubDate>Sat, 15 May 2021 10:00:00 GMT</pubDate>
      <category>Supply Chain Attacks</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Executive Order 14028: What It Means for Software Supply Chain Security]]></title>
      <description><![CDATA[President Biden's Executive Order 14028 redefined how the federal government approaches cybersecurity. Here's what every software vendor needs to know.]]></description>
      <link>https://safeguard.sh/resources/blog/executive-order-14028-software-supply-chain-security</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/executive-order-14028-software-supply-chain-security</guid>
      <pubDate>Wed, 12 May 2021 09:00:00 GMT</pubDate>
      <category>Compliance & Regulations</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Colonial Pipeline Ransomware Attack: How a Single Password Shut Down America's Fuel Supply]]></title>
      <description><![CDATA[The 2021 Colonial Pipeline attack exposed critical infrastructure vulnerabilities when a compromised VPN password led to a $4.4 million ransom and fuel shortages across the Eastern United States.]]></description>
      <link>https://safeguard.sh/resources/blog/colonial-pipeline-ransomware-attack-2021</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/colonial-pipeline-ransomware-attack-2021</guid>
      <pubDate>Sat, 08 May 2021 10:00:00 GMT</pubDate>
      <category>Ransomware</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Codecov Bash Uploader Compromise: A Retrospective]]></title>
      <description><![CDATA[A single altered line in Codecov's Bash Uploader leaked CI secrets for 69 days across thousands of repos. Here is what actually happened and why.]]></description>
      <link>https://safeguard.sh/resources/blog/codecov-bash-uploader-compromise-retrospective</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/codecov-bash-uploader-compromise-retrospective</guid>
      <pubDate>Thu, 15 Apr 2021 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Software Escrow Agreements: The Security Layer Most Companies Forget]]></title>
      <description><![CDATA[Software escrow agreements protect your organization when a critical vendor goes dark. Here is how to structure them with security in mind.]]></description>
      <link>https://safeguard.sh/resources/blog/software-escrow-agreements-security-guide</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/software-escrow-agreements-security-guide</guid>
      <pubDate>Mon, 15 Mar 2021 10:00:00 GMT</pubDate>
      <category>Risk Management</category>
      <author>hi@safeguard.sh (Yukti Singhal)</author>
    </item>
    <item>
      <title><![CDATA[Rust Foundation Formation: Security Implications]]></title>
      <description><![CDATA[The Rust Foundation launched February 8, 2021. Here is what its formation actually changed for the security of Rust and downstream ecosystems.]]></description>
      <link>https://safeguard.sh/resources/blog/rust-foundation-formation-security-implications</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/rust-foundation-formation-security-implications</guid>
      <pubDate>Wed, 10 Feb 2021 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[SunBurst: A Supply Chain Attack Evolution Study]]></title>
      <description><![CDATA[The SolarWinds SunBurst campaign rewrote the supply chain threat model. Five years of research reveal what changed and what defenders still miss.]]></description>
      <link>https://safeguard.sh/resources/blog/sunburst-supply-chain-attack-evolution-2020</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/sunburst-supply-chain-attack-evolution-2020</guid>
      <pubDate>Fri, 18 Dec 2020 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Shellshock, Five Years On: The Lessons That Stuck]]></title>
      <description><![CDATA[Five years after CVE-2014-6271, Shellshock remains the clearest case study in how one interpreter bug becomes thousands of downstream holes.]]></description>
      <link>https://safeguard.sh/resources/blog/shellshock-bash-vulnerability-lessons</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/shellshock-bash-vulnerability-lessons</guid>
      <pubDate>Tue, 24 Sep 2019 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[Heartbleed at Five Years: A Practitioner Retrospective]]></title>
      <description><![CDATA[Five years after CVE-2014-0160, Heartbleed still shapes how we think about shared cryptographic libraries, disclosure ethics, and open-source funding.]]></description>
      <link>https://safeguard.sh/resources/blog/heartbleed-openssl-five-year-retrospective</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/heartbleed-openssl-five-year-retrospective</guid>
      <pubDate>Sun, 07 Apr 2019 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[ASUS Live Update and ShadowHammer: The Backdoor]]></title>
      <description><![CDATA[Operation ShadowHammer pushed a signed backdoor to roughly half a million ASUS laptops, targeting a list of 600 specific MAC addresses.]]></description>
      <link>https://safeguard.sh/resources/blog/asus-live-update-backdoor-shadowhammer</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/asus-live-update-backdoor-shadowhammer</guid>
      <pubDate>Thu, 28 Mar 2019 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[XcodeGhost: When the Compiler Was the Attacker]]></title>
      <description><![CDATA[XcodeGhost in 2015 infected at least 128 million iOS users through a malicious Xcode download. It is still the cleanest compiler-trust case.]]></description>
      <link>https://safeguard.sh/resources/blog/xcodeghost-ios-compiler-supply-chain-2015</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/xcodeghost-ios-compiler-supply-chain-2015</guid>
      <pubDate>Mon, 18 Feb 2019 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[event-stream: The Copay Attack That Rewrote npm]]></title>
      <description><![CDATA[The 2018 event-stream incident was npm's first high-profile maintainer-handoff attack. The details still shape how we evaluate package trust.]]></description>
      <link>https://safeguard.sh/resources/blog/event-stream-npm-malicious-publish-2018</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/event-stream-npm-malicious-publish-2018</guid>
      <pubDate>Tue, 27 Nov 2018 12:00:00 GMT</pubDate>
      <category>Open Source Security</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[CCleaner 2017: Anatomy of a Quiet Supply Chain Hit]]></title>
      <description><![CDATA[The CCleaner backdoor of 2017 was among the first modern build-system compromises to achieve mass distribution through a trusted installer.]]></description>
      <link>https://safeguard.sh/resources/blog/ccleaner-supply-chain-attack-2017-analysis</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ccleaner-supply-chain-attack-2017-analysis</guid>
      <pubDate>Tue, 19 Sep 2017 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[Equifax: The Supply Chain Angle Few Talked About]]></title>
      <description><![CDATA[The 2017 Equifax breach is a case study in Apache Struts, inherited dependencies, and a vulnerability management process that mistook lists for action.]]></description>
      <link>https://safeguard.sh/resources/blog/equifax-data-breach-supply-chain-angle</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/equifax-data-breach-supply-chain-angle</guid>
      <pubDate>Fri, 15 Sep 2017 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Shadab Khan)</author>
    </item>
    <item>
      <title><![CDATA[M.E.Doc and NotPetya: The Origin Story]]></title>
      <description><![CDATA[The forensic detail of how M.E.Doc's update server became the delivery mechanism for NotPetya, and what it means for small-vendor risk.]]></description>
      <link>https://safeguard.sh/resources/blog/ukrainian-m-e-doc-notpetya-origin-story</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/ukrainian-m-e-doc-notpetya-origin-story</guid>
      <pubDate>Mon, 04 Sep 2017 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[NotPetya's Origin: A Supply Chain Story From Ukraine]]></title>
      <description><![CDATA[NotPetya is remembered as ransomware. It was not. It was a supply chain wiper that detonated through Ukrainian tax software in June 2017.]]></description>
      <link>https://safeguard.sh/resources/blog/notpetya-ukraine-supply-chain-origin</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/notpetya-ukraine-supply-chain-origin</guid>
      <pubDate>Wed, 05 Jul 2017 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
    <item>
      <title><![CDATA[WannaCry's Supply Chain Dimensions]]></title>
      <description><![CDATA[WannaCry was not a supply chain attack in the usual sense. Its real supply chain story is EternalBlue, NSA leaks, and the patch cycle.]]></description>
      <link>https://safeguard.sh/resources/blog/wannacry-ransomware-supply-chain-dimensions</link>
      <guid isPermaLink="true">https://safeguard.sh/resources/blog/wannacry-ransomware-supply-chain-dimensions</guid>
      <pubDate>Sat, 20 May 2017 12:00:00 GMT</pubDate>
      <category>Incident Analysis</category>
      <author>hi@safeguard.sh (Nayan Dey)</author>
    </item>
  </channel>
</rss>