Discover the top ten mistakes to avoid when implementing a secure software supply chain solution. Based on real user experiences with Sonatype Nexus Lifecycle, this approach delivers benefits that include reduced security and licensing risks, as well as improved time-to-market for new applications, resulting in increased developer productivity.
Discover the top ten mistakes to avoid when implementing a secure software supply chain solution. Based on real user experiences with Sonatype Nexus Lifecycle, this approach delivers benefits that include reduced security and licensing risks, as well as improved time-to-market for new applications, resulting in increased developer productivity.
Malicious hackers are becoming increasingly adept at attacking the underbelly of the Software Supply Chain. To cause the most damage while remaining undetected, hackers are rapidly evolving their attack methods.
Did you know the average application consists of 106 open source components and contains 23 known vulnerabilities?
Speak to our technical experts at booth #1481 to learn more.
Malicious hackers are becoming increasingly adept at attacking the underbelly of the Software Supply Chain. To cause the most damage while remaining undetected, hackers are rapidly evolving their attack methods.
Did you know the average application consists of 106 open source components and contains 23 known vulnerabilities?
Speak to our technical experts at booth #1481 to learn more.
Turn up the heat this summer! Enter our raffle for a chance to win BBQ Bliss Bundle: Napoleon Phantom Travel Portable Grill and a Backyard Steakhouse Crate.
The lucky winner will be chosen at random on August 15th.
Turn up the heat this summer! Enter our raffle for a chance to win BBQ Bliss Bundle: Napoleon Phantom Travel Portable Grill and a Backyard Steakhouse Crate.
The lucky winner will be chosen at random on August 15th.
Sr. Security Researcher & Advocate
Protestware and Software Hijacks: An Ongoing Problem in Need of a Novel Fix
Cases of maintainers behind popular open source projects sabotaging their own software to make a point have been on the rise in 2022. Whether a peaceful protest simply sharing a message, to more destructive ones, aimed at wiping data from specific targets, to the truly devastating, where packages get deleted altogether, the trend highlights a fragility within open source that can’t be ignored.
Combine this self-sabotage with an equal rise in malicious attackers hijacking oss projects, and the concern gets even greater. With open source so ubiquitous in applications, the risk of not solving these new challenges could be catastrophic.
Sonatype Headquarters - 8161 Maple Lawn Blvd #250, Fulton, MD 20759
Tysons Office - 8281 Greensboro Drive – Suite 630, McLean, VA 22102
Australia Office - 60 Martin Place Level 1, Sydney, NSW 2000, Australia
London Office -168 Shoreditch High Street, E1 6HU London
Subscribe for all the latest software security news and events
Copyright © 2008-present, Sonatype Inc. All rights reserved. Includes the third-party code listed here. Sonatype and Sonatype Nexus are trademarks of Sonatype, Inc. Apache Maven and Maven are trademarks of the Apache Software Foundation. M2Eclipse is a trademark of the Eclipse Foundation. All other trademarks are the property of their respective owners.
Terms of Service Privacy Policy Modern Slavery Statement Event Terms and Conditions Do Not Sell My Personal Information