Security | Threat Detection | Cyberattacks | DevSecOps | Compliance



Log4j Vulnerability and the Importance of SBOM in Software Supply Chain Security

The Apache Log4j vulnerability has been making global headlines since it became public on 9th December 2021. The report stated that the vulnerability affects Apache log4j between versions 2.0 and 2.14.1 and is independent of the underlying JDK version. It was a full-blown security meltdown that resulted in hackers performing remote code executions and affected digital systems across the globe. In response, Apache implemented patch fixes, but some components remained unattended.


How to generate an SBOM for JavaScript and Node.js applications

SBOM is the acronym for Software Bill of Materials, which is a list of all the open source npm packages that are part of your project. But it’s not only limited to open source or software packages, and can include operating system libraries, microservices inventory and more.


Snyk and ServiceNow collaborate on new SBOM solution

ServiceNow’s biggest event of the year — Knowledge 2023 — is here, and Snyk is excited to be a part of it with some big news! Back in January, we announced Snyk Security for Application Vulnerability Response to bring Snyk Open Source software composition analysis to ServiceNow Security Operations.


In the age of AI, how do you know what data to trust?

Last week, the godfather of AI, Geoffrey Hinton smashed the glass and activated the big red AI alarm button warning all of us about creating a world where we won’t “be able to know what is true anymore”. What’s happening now with everything AI makes all the other tech revolutions of the past 40 plus years seem almost trivial.

Instaproof in action! Drag. Drop. Verify!

Will demonstrates how easy it is to use RKVST Instaproof to verify the authenticity of a document. With Instaproof, you can drag and drop any file to instantly verify its origin, so you can make informed decisions about whether to trust it or not. Instaproof is perfect for anyone that wants to ensure the authenticity and provenance of their data, whether it's for regulatory compliance, intellectual property protection, or just good business practice.

RKVST Instaproof - instant data provenance

Drag. Drop. Verify! Instantly verify the origin, provenance and authenticity of any file with a simple drag and drop. Quickly identify fraudulent or modified data, or data of unknown provenance. RKVST Instaproof is the fastest way to instantly prove who did what when for any digital asset. Connects with your existing data – on premises or in the cloud including Dropbox, OneDrive and Google Drive

Enhance Your Cybersecurity With An SBOM

With all the cybersecurity benefits an SBOM offers, it’s a wonder they weren’t used in the software development life cycle long ago. Today, the need for SBOMs has grown more urgent because open source has become a core part of modern software development. At least one report finds that 75% of all codebases audited were composed of open-source components with known security vulnerabilities.