Creating a Secure Software Supply Chain You Can Trust

Evolve with the ever-growing changes in the industry by reviewing the trends seen in modern development. As scrutiny on the supply chain has grown, so has our focus in Fortify.

Insights Included:

  • Secure third-party software while adapting to change
  • Software supply chain attacks have rapidly increased over the last 4 years
  • Learn about the 3 categories attacks fall into
  • Innovative Multi-Pronged Approach through Fortify

Over the four years to June 2019, software composition analysis firm Sonatype documented 216 software supply-chain attacks. The following year, the number of attacks topped 900, and the year after that, the number of attacks jumped 650% to more than 12,000. Could we just put this quote as “Over the four years to June 2019, Sonatype documented 216 software supply-chain attacks. The following year, the number of attacks topped 900, and the year after that, the number of attacks jumped 650% to more than 12,000.”? I just want to stress the increase in attacks.

To support a security of the software supply chain, the technology components need to work together. CyberRes has a portfolio of products that are tightly integrated and address the different facets of supply chain security

CyberRes Fortify give companies the capability to analyze static code for defects and vulnerabilities, as well as test runtime behavior dynamically.

release-rel-2024-3-1-9400 | Thu Mar 14 23:51:15 PDT 2024
9400
release/rel-2024-3-1-9400
Thu Mar 14 23:51:15 PDT 2024
AWS