handmade.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
handmade.social is for all handmade artisans to create accounts for their Etsy and other handmade business shops.

Server stats:

35
active users

#supplychainsecurity

0 posts0 participants0 posts today
anchore<p>🚀 Part 2 is live! Dive into the evolution of SBOMs from Release to Production in our final installment. Enhance your software security today. Read here 👉 <a href="https://anchore.com/blog/the-evolution-of-sboms-in-the-devsecops-lifecycle-part-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">anchore.com/blog/the-evolution</span><span class="invisible">-of-sboms-in-the-devsecops-lifecycle-part-2/</span></a> <a href="https://mstdn.business/tags/SBOM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBOM</span></a> <a href="https://mstdn.business/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://mstdn.business/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChainSecurity</span></a></p>
Dan Fernandez :verified: :mastodon:<p>Interesting finding on application dependencies from Sonatype State of Open Source Report. </p><p>Most Pulled Ecosystems<br>- JS: 4.5 Trillion<br>- Python: 530 Billion <br>Outdated software continued to be pulled<br>- 13% of Log4J downloads are vulnerable<br>- 80% of Application dependencies are never upgraded</p><p>Language Ecosystems Coverage <br>- Only 10.5% of open-source components are actively used out of the 7 million available<br>- 180 is the average number of Open Source components per application </p><p>Vulnerability Remediation<br>- The report states the average fix times for even critical vulnerabilities is 200-250 days, with some taking over 500 days to fix.</p><p>What application frameworks are you mostly using in your environment? What makes it challenging for application development teams to keep all dependencies up to date during initial development and once in production? </p><p><a href="https://infosec.exchange/tags/applicationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>applicationsecurity</span></a> <a href="https://infosec.exchange/tags/supplychainsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychainsecurity</span></a> <a href="https://infosec.exchange/tags/applicationdevelopers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>applicationdevelopers</span></a></p>
LMG Security<p>Software supply chain vulnerabilities can put your organization at risk before you or your vendor know there is an issue. Watch this 9-minute case study to see how an unknown <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> vulnerability in a commonly used <a href="https://infosec.exchange/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a> can turn into a <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> and learn how to reduce your risk! <a href="https://youtu.be/cB8iriZJ57k" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/cB8iriZJ57k</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/VendorRisk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VendorRisk</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/riskmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>riskmanagement</span></a></p>
Guardians Of Cyber<p>🔐 Crypto enthusiasts, beware! Multi-vector supply chain attacks are on the rise, targeting trusted platforms through compromised libraries and Trojanized updates. 🛡️ Regular audits and SBOMs can help secure your assets.</p><p>How do you ensure your digital wallets stay safe from complex threats? Share your insights!</p><p>🔗 Read more: <a href="https://guardiansofcyber.com/threats-vulnerabilities/multi-vector-attacks-digital-wallets/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">guardiansofcyber.com/threats-v</span><span class="invisible">ulnerabilities/multi-vector-attacks-digital-wallets/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/GuardiansOfCyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GuardiansOfCyber</span></a> <a href="https://infosec.exchange/tags/CryptoSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CryptoSecurity</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a> <a href="https://infosec.exchange/tags/DigitalSafety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalSafety</span></a> <a href="https://infosec.exchange/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://infosec.exchange/tags/Blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blockchain</span></a> <a href="https://infosec.exchange/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
Annual Computer Security Applications Conference<p>Finally, we had Walther-Puri's "Beyond the XBOM: A Holistic Approach to Cyber Supply Chain Risk" discuss integrating tech supply chain security considering geopolitical and national risks. (<a href="https://www.acsac.org/2023/program/final/s324.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">acsac.org/2023/program/final/s</span><span class="invisible">324.html</span></a>) 5/5<br><a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChainSecurity</span></a> # Cybersecurity</p>
packagist<p>To celebrate Cyber Security Awareness month, join me in taking a closer look at how Composer and Packagist help you manage reported vulnerabilities in your software supply chain. <a href="https://blog.packagist.com/discover-security-advisories-with-composers-audit-command/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.packagist.com/discover-se</span><span class="invisible">curity-advisories-with-composers-audit-command/</span></a> <a href="https://phpc.social/tags/composerphp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>composerphp</span></a> <a href="https://phpc.social/tags/phpc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phpc</span></a> <a href="https://phpc.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://phpc.social/tags/php" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>php</span></a> <a href="https://phpc.social/tags/supplychainsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychainsecurity</span></a></p>
Janneke<p>If you run "guix pull" today, you get a package graph of more than 22,000 nodes rooted in a 357-byte program---something that had never been achieved, to our knowledge, since the birth of Unix: a Full-Source Bootstrap.</p><p>Edit: Add blog post link inline <a href="https://guix.gnu.org/en/blog/2023/the-full-source-bootstrap-building-from-source-all-the-way-down/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">guix.gnu.org/en/blog/2023/the-</span><span class="invisible">full-source-bootstrap-building-from-source-all-the-way-down/</span></a></p><p><a href="https://todon.nl/tags/GnuMes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GnuMes</span></a><br><a href="https://todon.nl/tags/bootstrappable" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bootstrappable</span></a> <br><a href="https://todon.nl/tags/BootstrappableBuilds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BootstrappableBuilds</span></a> <br><a href="https://todon.nl/tags/ReproducibleBuilds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReproducibleBuilds</span></a><br><a href="https://todon.nl/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChainSecurity</span></a><br><span class="h-card" translate="no"><a href="https://fosstodon.org/@reproducible_builds" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>reproducible_builds</span></a></span><br><span class="h-card" translate="no"><a href="https://hostux.social/@fsf" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>fsf</span></a></span><br><span class="h-card" translate="no"><a href="https://mastodon.social/@fsfe" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>fsfe</span></a></span></p>