Operations | Monitoring | ITSM | DevOps | Cloud

Supply Chain

Securing the Software Development Build

Tim Brown, SolarWind CISO and VP, Security, explains how SolarWinds is ensuring the integrity of the build process and how we share learnings with our partners, community, and customers; as well as how we're leveraging and contributing to open-source initiatives and lead by example in securing the supply chain.

Anatomy of a Supply Chain Attack Detection and Response

In today's world of global supply chains, a breach never stops at a supplier level but cascades all the way up the chain. So being able to detect and stop a supply chain attack at an early stage before an attacker exfiltrates confidential company data or damages company operations and reputation is critical to your organization's survival. Luckily, hackers always leave a trace, so proper detection can help you stop breaches at an early stage before hackers achieve their goals.

Create a Software Supply Chain with VMware Tanzu Community Edition

VMware Tanzu Community Edition offers Cartographer, advanced software supply chain tooling that can help you deliver applications more rapidly, securely, and efficiently at scale. In this video, Cora Iberkleid shows us how to use Cartographer to build and maintain paths to production from reusable building blocks and create pre-approved workflows that enable dev teams to focus on writing code and that boost their productivity.
Featured Post

The Evolution of Software Trends in 2022

Software delivery has never been more critical to the success of business in every industry. It's also never been more complex. With the growing challenges of complexity, how can engineering teams succeed? After analyzing millions of workflows from more than 50,000 organizations across the world, here are a few truths of software delivery today.

Secure Supply Chain: Verifying Image Signatures in Kubewarden

After these last releases Kubewarden now has support for verifying the integrity and authenticity of artifacts within Kubewarden using the Sigstore project. In this post, we shall focus on verifying container image signatures using the new verify-image-signatures policy. To learn more about how Sigstore works, take a look at our previous post

Updates Paused: How are MSPs Navigating Today's Supply Chain Issues?

The last few years have thrown about everything they could at the status quo. Shifting climates, political instability, and a global pandemic have all contributed to a broad host of network device supply chain issues. Consumers all over the globe are still affected by computer chip shortages and many other items delayed by supply chain issues. And it’s not expected to end anytime soon.

Wearables Are Hot! And Zebra's WS50 Is No Exception with Velocity

A new generation of wearable computers has entered the market. These new devices are the result of technology convergence, which is the tendency for technologies that were originally unrelated to become more closely integrated and even unified as they advance.

Startups apply artificial intelligence to supply chain disruptions

Over the last two years a series of unexpected events has scrambled global supply chains. Coronavirus, war in Ukraine, Brexit and a container ship wedged in the Suez Canal have combined to delay deliveries of everything from bicycles to pet food. In response, a growing group of startups and established logistics firms has created a multi-billion dollar industry applying the latest technology to help businesses minimize the disruption.