Operations | Monitoring | ITSM | DevOps | Cloud

Supply Chain

3 Key Takeaways from CloudNativeSecurityCon 2023

CloudNativeSecurityCon North America, a two-day event organized by the Cloud Native Computing Foundation (CNCF), recently took place in Seattle, Washington, and gave the industry an opportunity to come together to discuss cloud native security projects and how to address today’s security challenges and opportunities. Supply chain security was a hot topic at the event, as it has been across the industry for the last few years.

The Storage Supply Chain and Its Effect on Infrastructure Teams

For the past couple of years, no one has been able to escape the effects of supply chain problems throughout their personal and professional lives. According to our recent State of Hybrid Cloud Storage survey, storage and the IT equipment that supports storage systems were no exception, and disruptions created extra work and headaches for those teams.

6 Factors To Check While Choosing A 3PL Business For A Vape Company

3PL, or third-party logistics business, is a contract logistics service that outsources various parts of the organization's supply chain tasks to another company. Companies in this business generally provide warehousing, transportation, and delivery services. It is beneficial because it allows companies to better manage their operations by allowing them to focus on their areas of expertise while outsourcing the more labor-intensive tasks.

Software supply chain security: How to audit a security bill of material (SBOM)

A security bill of material (SBOM) is an inventory of the entire building components of a software application. These components include open source libraries, dependencies, commercial components, licenses, patch status, version information, upgrades available, CVEs, etc. Having an SBOM of a codebase or piece of software provides deep visibility into core components that help quickly identify and mitigate the security and licensing risks associated with the software supply chain.

IDC LINK: JFrog Introduces New Software Supply Chain Security Capabilities

As software becomes increasingly complex, the need to secure the software supply chain becomes more important — and more difficult. But how can businesses address the challenges of securing their software supply chain? The International Data Corporation (IDC) offers critical insight.

What is Supply Chain Choreography, and Why Should You Care?

The path to production has long been a space of custom pipelines, continuous integration (CI) sprawl, manual intervention, and tribal knowledge. Surely, there must be a better way? Something loosely coupled, more flexible, less error-prone, and doesn’t need deep integration with the tooling it controls. These goals motivated us to create Cartographer, our open source supply chain choreographer.

Supply Chain Security Workshop

More and more attacks are aimed at the entire supply chain, which means that we developers are increasingly targeted by the attackers. Attacks like the SolarWinds hack show us that making sure you don’t use vulnerable dependencies isn’t enough. The attackers have their sights set on the entire development process with its components. In this workshop, we will look at the first steps and try them out in practice which will enable you to integrate the topic of security into your everyday life as a developer.

Securing Productivity in Supply Chains

Mobile device management – it’s been part of your operational technology portfolio for a long time. You’ve been using it for years – or maybe decades – to stage device configurations, push software updates and more. You might be using our Ivanti Avalanche MDM solution to manage your rugged mobile deployments. The device, OS and app management capabilities remain at the center of your mobility management program, and that isn’t going to change.