Navigating Australian ISM Guidelines for Software Development

Navigating Australian ISM Guidelines for Software Development

In 2017, the Australian Cyber Security Centre (ACSC), a division of the Australian Signals Directorate (ASD), released the Information Security Manual (ISM). This comprehensive guide offers practical advice on safeguarding systems and ...
Securing development infrastructure: A new frontier in software supply chain security

Securing development infrastructure: A new frontier in software supply chain security

Software supply chains are indispensable to modern software development as they drive innovation and efficiency across industries. Yet, as vital as they are, these supply chains are also avenues for threats and ...
A guide for open source software (OSS) security

A guide for open source software (OSS) security

When you search for a dependable open source software (OSS) component to integrate into your software supply chain, evaluation of the component's security emerges as a critical task. This involves not only ...
Secure Software Development Attestation Form: Sonatype helps you comply

Secure Software Development Attestation Form: Sonatype helps you comply

On March 11, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the Office of Management and Budget (OMB) unveiled the final version of the Secure Software Development Attestation Form. This pivotal ...
Securing software development with Sonatype Air-Gapped Environment (SAGE)

Securing software development with Sonatype Air-Gapped Environment (SAGE)

Developers everywhere build modern applications from reusable pieces of code downloaded from repositories such as Maven Central ...
Open source risk management: Safeguarding software integrity

Open source risk management: Safeguarding software integrity

In the constantly shifting terrain of software supply chains, open source software (OSS) fulfills a dual mandate, propelling innovation forward and serving as the cornerstone of operational efficiency ...

Application Security Check Up