SBOM Sharing and Distribution Best Practices
Generating SBOMs is only half the battle. Sharing them securely and effectively with stakeholders requires careful planning and tooling.
Deep dives, practical guides, and incident analyses from engineers who build Safeguard. No fluff, no vendor FUD — just what you need to ship secure software.
Generating SBOMs is only half the battle. Sharing them securely and effectively with stakeholders requires careful planning and tooling.
Security considerations for blue-green deployment strategies including environment parity, rollback integrity, and data migration safety.
PHPStan brings static analysis to PHP. Its type checking catches entire classes of bugs that lead to security vulnerabilities in PHP applications.
A pre-release security checklist that covers dependency verification, vulnerability scanning, SBOM generation, and artifact integrity for every production release.
Configure GitHub repository security settings for branch protection, secret scanning, dependency alerts, and code scanning.
How to lock down Jenkins pipelines against credential theft, script injection, and unauthorized access with practical hardening steps.
Makefiles execute shell commands by design. When those commands incorporate untrusted input, the results are predictably dangerous.
Securing Tekton CI/CD pipelines on Kubernetes with task isolation, supply chain verification, and least-privilege service accounts.
Bandit scans Python code for security issues. Here is how to configure it so it catches real bugs without burying your team in false positives.
Weekly insights on software supply chain security, delivered to your inbox.