Resources

Secure your Software Development and Delivery

advanced-software-composition-analysis

Advanced Software Composition Analysis: A Modern Guide to Open Source Security

Discover how to secure your software supply chain with advanced strategies to detect, manage, and mitigate risks in open-source components. This eBook provides expert guidance on implementing effective Software Composition Analysis (SCA) to tackle vulnerabilities, ensure compliance, and protect against emerging threats in your open-source dependencies!

SDT9-SSCS-Resources

Software Supply Chain Security 2024 Wrap-Up - Key Takeaways and Strategic Vision for 2025

Register now for our final SafeDev Talk of the year and level up your Software Supply Chain Security! Join top industry experts as they revisit 2024’s pivotal lessons, uncover the latest trends, and share actionable insights to prepare for the challenges of 2025. This webinar is designed for security professionals and development teams eager to innovate and stay ahead in the dynamic world of software supply chain security. Register Now!

jesus-cuadrado-the-elephant-in-appsec

Risk, Product Management, and Supply Chain Security: Is There a Connection?

Watch this chapter of The Elephant in AopSec to find insights about Software Supply Chain Security and best practices for managing risks in product development. You will find lessons from the recent CrowdStrike incident on testing, update management, and third-party dependencies, as well as how Xygeni implements early malware detection, progressive delivery, and robust recovery plans to prevent incidents before they occur, and much more!

Open_Source_Malware_Protection

Open Source Malware Protection

Despite the critical role of OSS, its integration is fraught with security challenges. Recent reports highlight a surge in malware attacks targeting OSS, with incidents rising by 633% in 2022 and continuing to grow by 245% in 2023. Traditional security measures, which rely heavily on identifying known vulnerabilities through Common Vulnerabilities and Exposures (CVEs), are proving insufficient. These measures often involve delays in vulnerability reporting, limited coverage, and an inability to detect sophisticated and zero- day threats...

webinar-comercial-malware-detection

Real-Time Malware Detection in Open Source Components - NIS2 & DORA Implications

Watch our "Real-Time Malware Detection in Open Source" webinar to explore the latest malware threats impacting Open-Source Software (OSS). As the adoption of OSS grows, so do the volume and complexity of threats, presenting new challenges for developers and organizations alike. This insightful session will uncover the latest trends, emerging threats, and advanced strategies to safeguard your OSS dependencies from malicious attacks. Watch it now!

secure-software-developement-sdt8

Proactive Risk Management in DevSecOps - From Vulnerability to Defense

Watch now for our next SafeDev Talk and Revolutionize Your DevSecOps Strategy! Explore how proactive risk management can transform your DevSecOps strategy and fortify your software supply chain against emerging threats. This session is tailored for cybersecurity leaders and development teams dedicated to staying ahead in the increasingly complex landscape of vulnerabilities.

Se-Radio-banner

[External Resource] Se Radio Episode on the SSH Backdoor Attack With Luis Rodríguez

Join host Robert Blumen and Luis Rodríguez, CTO of Xygeni.io for a discussion of the recently thwarted attempt to insert a backdoor in the SSH (Secure Shell) daemon. OpenSSH is a popular implementation of the protocol used in major Linux distributions for authentication over a network. The conversation explores the mechanism of the attack through modifying a function table in the runtime; how the attack was inserted during the build and much more!

Resources-SDT7-SCA

Beyond Conventional SCA - Turning Pain Points into Security Gains

Watch our SafeDevTalk October edition to discover how to transform Software Composition Analysis (SCA) and secure your software supply chain against emerging threats.
This session is designed for cybersecurity leaders and development teams looking to stay ahead in today’s complex landscape of open-source vulnerabilities.

Ultimate-guide-CICD-pipeline

The Ultimate Guide to Protecting Your CI/CD Pipeline

Discover strategies to defend your CI/CD pipelines against emerging threats like Direct and Indirect PPE, malware injections, and artifact poisoning among others.
This eBook, written by Xygeni's Head of Pre-Sales Luis Garcia, is going to help you stay ahead of attackers with our expert guide on identifying, preventing, and responding to security risks in CI/CD pipelines!

Resources-SafeDevTalk-DORA

DORA - Understanding What’s at Stake from a Cybersecurity point of view

Watch our Opening Season's SafeDev Talk episode on DORA now to master it and stay ahead in the ever-evolving landscape of financial regulation. This webinar is crafted specifically for financial institutions and will help you navigate DORA’s impact on operational security and compliance. You will gain actionable strategies and expert insights, leaving you better prepared for the future!

SafeDev Talk 4

Malware attacks evolution - Why is important to detect them and how to do it

The fourth edition of SafeDevTalks features leading cybersecurity experts Derek Fisher, Abhilasha Sinha, and Luis Rodriguez. This episode will delve into the critical topic of reliance on third-party and open-source components in software development, revealing the hidden vulnerabilities and emerging threats. Join us to learn more about hidden vulnerabilities, expanding threats, real world breaches and much more!

SafeDev_Talk_5_Resources

Scaling Application Security - New Challenges and Implementing Proactive Defenses

This must-watch episode tackles the urgent need for secure applications amid rising data breaches, challenges in building scalable software, and risks with open-source integration. Discover strategies for orchestration, automation, and threat modeling to combat alert fatigue and prioritize critical threats. Don’t miss it!

SafeDev Talk III - ASPM

Do you need ASPM in your life? Strengthen your Cybersecurity Practices!

Application Security Posture Management (ASPM) is gaining traction day by day. However, its specific functionalities might not be entirely clear for everybodySecure your spot now! Join our SafeDev Talk “Do you need ASPM in your life?” with cybersecurity experts James Berthoty, William Palm and Jesus Cuadrado to explore the potential of ASPM as a holistic application security solution and keep empowering your organization!

Software Supply Chain Security Retrospect: Shaping a safer 2024

Unlock key insights into the evolving landscape of Software Supply Chain Security. Dive into the challenges, threats, and anticipated trends of 2024 – your guide to navigating the complex web of cybersecurity. Outstanding Facts in Numbers: Discover the numerical landscape of software supply chain security – facts that illustrate the gravity of the situation. Evolution of Bad Actors...

SBOM_Security_resources

Demystifying SBOM Security - Conquering Software Supply Chain Complexity

Join us for "Demystifying SBOM Security," where cybersecurity experts Jennifer Cox, Santosh Kamane and Jesus Cuadrado will reveal the importance of SBOM in enhancing software quality, and security, and ensuring compliance. This webinar is essential for gaining knowledge on how to secure your software supply chain effectively. Learn how easily you can empower Your Software Security Posture!

Securing_CI/CD

[External Resource] Latio Tech | Securing CI/CD Pipelines with Xygeni

Join James Berthoty on an insightful journey into the heart of Xygeni's pioneering Advanced Software Protection Management. In his latest video, James transitions from exploring upstream malware detection to revealing our cutting-edge strategies. With his extensive experience in pen-testing, he offers a unique perspective on maintaining repository health and navigating real-world supply chain threats. Don't miss out on his expert insights—your guide to understanding the complexities of ASPM like never before.

Neuco-podcast

[External Resource] Neuco's The Cyber Security Matters Podcast on Software Supply Chain Security With Luis Rodríguez

Listen to Neuco's The Cyber Security Matters Podcast episode on "The new challenge in software security: how to keep devops running while not falling under supply chain attacks" with Luis Rodriguez, CTO at Xygeni, and explore the changing challenges of securing the software supply chain.

Xygeni Product Suite Overview: Secure Your Software And Delivery

Xygeni’s unique capabilities provide complete visibility in the software supply chain, enabling a systematic process for assessing the risks associated with their software supply chain, identifying and prioritizing the most critical components, and evaluating and improving their global and detailed security posture at an effective and efficient effort ...

IaC_Security_Product_Brief

Infrastructure as Code (IaC) Security Product Brief

Securing your Infrastructure as Code (IaC) is essential in software development because misconfigurations and vulnerabilities can seriously harm your systems and give hackers opportunities to attack. Xygeni’s IaC security tools help prevent these issues before they become problems, reducing the risk of data exposure and cutting down on expensive fixes...

SSCS-in-2024

Exploring the Horizon: Dive into the essential insights and predictions for SSCS in 2024.

Thoughtworks, Codurance and Xygeni experts will share their insights on Software Supply Chain Security in 2024. Elevate your security posture and safeguard your business’s reputation and continuity. Are you ready for the evolution of Software Supply Chain Security in 2024?

Navigating-the-future-of-sscs

Navigating the Future of Software Supply Chain Security: A NIST SP 800-204D Perspective

Our comprehensive whitepaper delves into the intricacies of NIST SP 800-204D for Comprehensive SSCS Practices and their significance in today’s software development environment. Through this insightful guide, you will gain valuable knowledge on how to leverage NIST guidelines to: Strengthen Software Supply Chain Security,...

Secrets Security Resources

Secrets Security Product Brief

Xygeni Secrets Security acts as your reliable protector, designed to prevent the leakage of critical secrets like passwords, API keys, and tokens. As cyber threats constantly evolve, it’s vital to have a solution that not only detects but actively prevents leakages before they lead to a breach. Xygeni enables your teams to work with confidence, ensuring that your development secrets are kept secure...

RSA Conference 2024

RSA Conference 2024 | Webinar On Cybersecurity Trends

You were not able to make it to the RSA Conference 2024 in San Francisco? No problem! Watch our exclusive webinar and get ahead of some of the most critical trends in cybersecurity, from changes in CISO roles to leading cyber-defense state-of-the-art developments—all at your desk. In this webinar, you will deep dive into the most updated insights and strategies that the cybersecurity world has to offer!

ASPM_Product_Brief

Application Security Posture Management (ASPM) Product Brief

Xygeni’s Application Security Posture Management (ASPM) helps address these challenges by integrating accurate proprietary scanning with advanced prioritization capabilities. By considering context information such as asset relationships, severity, exploitability, exposure, business impact, and other customer-defined criteria, Xygeni reduces unnecessary noise...

SSCS_Product_Brief

Software Supply Chain Security (SSCS) Product Brief

The frequency and impact of software supply chain attacks have surged, emphasizing the need for stringent CI/CD security. Recent statistics reveal a staggering 742% increase in such attacks from 2019 to 2022, with forecasts suggesting that 45% of organizations will be affected by 2025. ..

webinar-live-cicd-episode-2

Episode 2: Best practices for CI/CD protection from OWASP perspective


Join this second episode of the CI/CD webinars featuring Luis Rodríguez, CTO, and co-founder of Xygeni, and Luis Manuel García, Sales Support Manager. In this session, we will explore the “blue team” perspective of CI/CD security, diving deep into actionable steps organizations can take to enhance their security posture ...

OSS_Product_Brief

Open Source Security Product Brief

Xygeni’s Open Source Security solution is essential. It scans and blocks harmful packages upon publication, dramatically reducing the risk of malware and vulnerabilities infiltrating your systems. Our comprehensive monitoring spans multiple public registries, ensuring all dependencies are scrutinized for safety and integrity. Xygeni also enhances your team’s ability...

Anomaly_Detection_Product_Brief

Anomaly Detection Product Brief

Xygeni’s Anomaly Detection platform provides an additional layer of security by continuously monitoring and analyzing activities within your SCM and CI/CD infrastructure to identify and respond to unusual behavior quickly. Xygeni detects anomalies that indicate unauthorized modifications, access, or exploitations in real time. This proactive approach ensures ...

Securing_the_SSC

Securing the Software Supply chain: from CI/CD Security Risks to Protection Strategies

In the rapidly evolving world of software development, securing the software supply chain has become a critical concern. This eBook provides a comprehensive guide to understanding and mitigating the threats to the software supply chain, with a particular focus on Continuous Integration/Continuous Deployment (CI/CD) systems...

Keys-to-a-Secure-CICD-Resources

Keys to a Secure CI/CD: a Webinar with an OWASP Focus

Join Luis Rodríguez, CTO of Xygeni, and Luis Manuel García, Sales Support Manager, in this Webinar about Secure CI/CD. Learn from our experts how to adopt OWASP best practices to strengthen the security of your CI/CD and protect your software supply chain. Protect your CI/CD and software supply chain with OWASP. They will talk about Inventory and Analysis, CI/CD Risks, Detection and Prevention among many other things!

jesus-cyberdefensemagazine

[External Resource] Cyber Defense Radio Interview with Jesús Cuadrado

Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this hotseat interview is with Jesús Cuadrado the Chief Product Officer of Xygeni (https://xygeni.io) @xygeni where we discuss how to secure your software development and delivery. Gain new insights into cybersecurity from our always free monthly publication, no strings attached.

webinar cicd episode 1 web

Episode 1: CI/CD Security webinars series From new attack tactics to protection strategies

In this rapidly evolving digital landscape, the security of your software supply chain is more critical than ever. As new attack tactics emerge, it’s crucial to stay ahead of the curve and arm yourself with the latest protection strategies In this webinar, Luis Rodriguez will guide you ...

SSCS_Attacks

Software Supply Chain Security: Understanding Supply Chain Attacks

Software supply chain attacks are becoming increasingly prevalent and devastating, with Gartner predicting that 45% of all businesses will experience a breach by 2025. Cybersecurity Ventures further underscores the gravity of this threat, projecting a staggering $138 billion in annual damages caused by software supply chain attacks by 2031.These alarming forecasts highlight the urgent need for organizations to prioritize their SSCS. Learn how!

How Xygeni Supports DORA Implementation

DORA Digital Operational Resilience Act sets rigorous standards to improve the operational resilience of the financial sector across the European Union. As your organization prepares for DORA compliance by January 2025, understanding its requirements and implementing the right solutions is critical and Xygeni can help you out. Xygeni offers a set of cutting-edge solutions tailored to ensure comprehensive compliance with the DORA framework. Our platform will enhance your institution’s capabilities in risk management ...